1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nina [5.8K]
3 years ago
8

The birthday attacks are called so because we can only have 365 birthdays (oh well, excluding 2/29). So, if there are 366 people

in a place at least two of them have the same birthday - thus causing collision(s). Same things happens in hash algorithm. The people in birthday attack is the same thing as:___________. 1. hash in the hash algorithm. 2. input in the hash algorithm. 3. the algorithm in hash algorithm. 4. the key
Computers and Technology
1 answer:
vazorg [7]3 years ago
5 0
<h2>Answer:</h2>

2. input in the hash algorithm

<h2>Explanation:</h2>

In a hash algorithm, a function called <em>hash function (say H) </em>is chosen to transform a variable sized input n, and return a fixed size string called the <em>hash value (say h). </em>i.e

H(n) => h

Comparing this to the birthday attacks;

i. the hash function is getting the people's birthdays - H,

ii. the input is each person in the group of people - n,

iii. the hash is the value of the birthday of each person - H(n).

You might be interested in
With dhcp, a device borrows, or ____ an ip address while it is attached to the network.
mestny [16]

I guess the correct answer is leases.

With DHCP, a device borrows, or leases an IP address while it is attached to the network.

8 0
3 years ago
What is the difference between throughput and bandwidth?
masha68 [24]

Answer: Please find below the answer along with explanation.

Explanation:

For  a given communication channel (for instance, a LAN segment using Ethernet ) the Bandwidth refers to the theoretical maximum data rate that the channel can support, for instance, 100 Mbps in a 100Base T network.

The throughput, instead, refers to the actual data rate achieved in a given communications channel, taking into account the different channel impairments.

For instance, in a LAN segment that uses the original Ethernet 802.3 standard (CSMA/CD), a frequent occurrence of collisions can take down the actual data rate from the theoretical 100 Mbps to a very lower figure, i.e., 5 Mbps.

4 0
3 years ago
Suppose there are 69 packets entering a queue at the same time. Each packet is of size 7 MiB. The link transmission rate is 1.7
svp [43]

Answer:

69.08265412 milliseconds

Explanation:

Lets first convert 7 MiB to bits

7*1024*1024*8=58720256 bits

Now convert bits to Gbits

58720256/10^{9}  =0.058720256 Gbits

Queuing Delay = Total size/transmission link rate

Queuing Delay= \frac{0.058720256}{1.7} =0.03454132706 seconds

Delay of packet number 3 = 0.03454132706*2=0.06908265412 seconds

or 0.06908265412= 69.08265412 milliseconds

7 0
3 years ago
What is the advantage of learning through story compared to learning through personal experience?
Inessa [10]

Answer:

Personal Experience

Explanation:

If a story is based on a personal experience then yes, the two doesn't matter. <em>However</em>, usually learning through personal experience is better because you learn firsthand while stories are written from a different perspective.

6 0
3 years ago
Read 2 more answers
Computer are most wonderful creation of 21st century how ?​
son4ous [18]

Answer:

It can do all the functions at a speedy rate and also helps us to search and progress in our homes and businesses. A computer can therefore be called a calculator with a twist for not only does it perform fast calculations, but it also has other special characteristics.

Explanation:

hope it helps you

6 0
2 years ago
Other questions:
  • Philip is thinking about customizing his motorcycle. A paint job, saddlebags, and a radio would cost $600. His motorcycle is old
    15·2 answers
  • I dopped my Fujifilm Instax mini 8 and now the case won't close and it takes blank pictures can anyone tell me what to do, pleas
    6·2 answers
  • Given the commands below, what do they do? for (position = 1 through aList.getLength()/2) { a = aList.getEntry(aList.getLength()
    11·1 answer
  • Select the correct answer. What has enabled engineers to design slim and sleek television sets? A. using Nipkow disks B. increas
    7·1 answer
  • The acronym pies is used to describe improvised explosive devices (ied) components. pies stands for:
    13·2 answers
  • How many of the colonists of Jamestown died before they made it to shore, due to the difficult voyage?
    15·1 answer
  • Cuales son las paginas web​
    12·1 answer
  • PLZ HELP ASAP
    13·1 answer
  • I need it in code please (python)
    15·2 answers
  • What are 2 ways to send a message to your client when signed in as an accountant user?.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!