1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
astra-53 [7]
3 years ago
12

Which of the following describes a hash algorithms ability to avoid the same output from two guessed inputs?A. Collision avoidan

ceB. Collision resistanceC. Collision strengthD. Collision metric
Computers and Technology
1 answer:
Minchanka [31]3 years ago
7 0

Answer: B) Collision Resistance

Explanation: A hash algorithm is the function that works by changing the string of data into the string of numeric values. The numeric values that are obtained are of the fixed length.

The collision is the attack in found when the produced outcome is same for the  two different string inputs. The hash algorithm has the ability to resist the collision by the cryptography technique . Cryptographic hash function are is for maintaining the authenticity of the input function.

Thus, the correct option is option(B). The other option are collision avoidance refers as the escaping the collision ,collision strength refers to the strength ability of collision and collision metric refers to pattern of collision, which are incorrect.

You might be interested in
I NEED SOME MAJOR HELP W/ THIS!!! PLSSS. WHOEVER HELPS GETS 80 POINTS!!! I NEED IT DONE SOON! TYY <3;)
Oksanka [162]

Answer:

I probably won't awnser them all but I'll try my best

Explanation:

Hacking is a breach of privacy online usually caused by some kind of malware injected into your device there's multiple types of this program or files malware which simply damages and harms your device. A Trojan horse is a program which tricks you by selling you a fake product which has code in it which has code which gives the hacker remote access to your device this program is usually free and masked like a crack or patch of a certain program. U got the second an third question with this one so u can just divide it into pieces. Piracy is Hacking but this time the hacker is stealing ur information through the malware. Invasion of privacy can have multiple forms online and offline. Online intrusion is when a service gives out information you entrust to it while off line Intrusion is stalking trespassing blackmail etc.

4 0
3 years ago
Write a program that computes and displays a 15 percent tip when the
Anuta_ua [19.1K]
Your question wasn't very clear, but I think I understand what you want. Additionally, you should really state what language you're working with. Here it is in C#, and shouldn't be too much of a hassle to translate in to other languages.


Console.Write("Enter payment: ");

float payment;

if (float.TryParse(Console.ReadLine(), out payment))
    Console.WriteLine((Math.Floor(payment * 100) / 100) * 0.15, + " at 15% tip.");
else
    Console.WriteLine("Invalid input.");
5 0
3 years ago
What is the purpose of the product backlog refinement
BigorU [14]

Answer:

A

Explanation:

6 0
3 years ago
Read 2 more answers
Which of the following are the lines defining the borders of a shape? (1 point)
shtirl [24]

Answer:

no I is edges

2 is gaming

3 is creativity

3 0
3 years ago
How can i see what websites are visited on my wifi
grigory [225]

Answer:

If you want to view sites visited on a wireless network, you can check the logs stored by the wireless router to see what information is available. You may need to set your logging settings to capture the data you want.

Explanation:

5 0
2 years ago
Other questions:
  • A client reports the client has been experiencing increased stress at work. The client has been managing the stress by drinking
    5·1 answer
  • Tell me about how to build robots
    11·1 answer
  • What is used for World Wide Web?
    7·1 answer
  • Which of these are examples of a Single Sign-On (SSO) service?
    5·1 answer
  • Consider the following C++ program in which the statements are in the incorrect order. Rearrange the statements so that itprompt
    6·1 answer
  • I’m gonna ask this again because I REALLY need an answer.
    10·2 answers
  • What is the scope of numC?
    8·2 answers
  • ________________, _______________ and ___________ are what you see when you open Excel
    14·2 answers
  • The ________ approach to motivation suggests a connection between internal physical states and outward behavior. achievement dri
    14·1 answer
  • Show that ALLDFA is in <img src="https://tex.z-dn.net/?f=%5Cmathrm%7BP%7D" id="TexFormula1" title="\mathrm{P}" alt="\mathrm{P}"
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!