1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
astra-53 [7]
3 years ago
12

Which of the following describes a hash algorithms ability to avoid the same output from two guessed inputs?A. Collision avoidan

ceB. Collision resistanceC. Collision strengthD. Collision metric
Computers and Technology
1 answer:
Minchanka [31]3 years ago
7 0

Answer: B) Collision Resistance

Explanation: A hash algorithm is the function that works by changing the string of data into the string of numeric values. The numeric values that are obtained are of the fixed length.

The collision is the attack in found when the produced outcome is same for the  two different string inputs. The hash algorithm has the ability to resist the collision by the cryptography technique . Cryptographic hash function are is for maintaining the authenticity of the input function.

Thus, the correct option is option(B). The other option are collision avoidance refers as the escaping the collision ,collision strength refers to the strength ability of collision and collision metric refers to pattern of collision, which are incorrect.

You might be interested in
Code Problem 3 in Python 2.
11111nata11111 [884]

I've included my code in a picture below. I hope this helps.

7 0
2 years ago
Your task is to create a bash shell script that is able to backup all the C++ program files in your current directory. The algor
Oliga [24]

Answer:

backup() {

 read dirname;

 if [[ whereis . /`$dirname` 2>  sterr.exe]]  

    then

        mkdir  $dirname

 for f in . / *.cpp

 do

    cp f "path_to_dirname"

    echo "file backup complete"

}

backup( )

Explanation:

The bash script above is used to backup C++ source files in a directory to a backup directory which is created if it does not exist, and copy's each .cpp file to backup, then sends a message to declare its completion.

7 0
3 years ago
The operating system is not directly involved in one of these tasks.Immersive Reader
Alex73 [517]
Displaying a web page
3 0
3 years ago
What information on social networking sites could be used to discriminate against a potential employee
NISA [10]

the answer on plato is b

political affiliations

3 0
3 years ago
What: A challenging question on this module's material.
Alekssandra [29.7K]

Need further information!!!

6 0
2 years ago
Other questions:
  • Use the script below as a starting point to create a Rectangle class. Your rectangle class must have the following methods;A con
    12·1 answer
  • It is important for a writter to include voice and point of view in writting because _______
    11·1 answer
  • Media messages are communicated through which of the following:
    8·2 answers
  • Which table attributes would this code produce?
    15·1 answer
  • analyze the ethical issues in the use of information technology in Multinational company (MNC) and support you answer with one e
    15·1 answer
  • The signature area in a cover letter includes the sender's first and last name, followed by his/her job title (if applicable). *
    13·1 answer
  • Both instructions and data in a digital<br>computer are represented as binary<br>digits. True False​
    13·1 answer
  • How can injection attacks be prevented? Check all that apply
    6·2 answers
  • Which of the following does Secure Sockets Layer (SSL) use to authenticate a user or system before encrypting a session?
    14·1 answer
  • Mobile apps are replacing the old__________<br><br>​
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!