1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alja [10]
3 years ago
7

A ____ is a key-dependent, one-way hash function that allows only specific recipients(symmetric key holders) to access the messa

ge digest.a. signature
b. fingerprintc. MAC
d. digest
Computers and Technology
1 answer:
Alexxx [7]3 years ago
7 0

Answer: (C) MAC

Explanation:

MAC is stand for the message authentication code and it is one of the key dependent hash function. Message authentication provide the data integrity and also the origin of data authentication.

  • It basically allow the specific recipients known as the holder of the symmetric key.
  • The message authentication code uses the CBC (Cipher block chaining) mode for constructing the MAC algorithm and it also uses the block cipher for the conjunction by using the CBC operations.    

On the other hand, all the options are incorrect as they are not the key dependent hash function.

Therefore, Option (C) is correct.

You might be interested in
3) How ash traditional technology and modern
Fynjy0 [20]

Answer:

While the developed world benefits from the modern explosion of technology, countries like Ethiopia continue to rely on their forefathers' methods for important daily tasks such as farming, cooling, and providing clean water. These activities are often physically challenging, time and energy intensive, and are often carried out by female family members in many such societies. Furthermore, they can damage the local ecology and climate, such as deforestation and soil erosion caused by the use of trees for firewood. Western technologies are often too complicated, expensive, unacceptable, and difficult to maintain in developing societies, so they are of little or no use in these situations.

4 0
3 years ago
What does it mean by does the author create an emotional connection toward the readers?
andreyandreev [35.5K]

Answer:

the author makes an emotional connection between you and the character

Explanation:

short version:you feel the characters emotion

6 0
3 years ago
C++
Nookie1986 [14]

Answer:

Following are the code to the given question:

#include <iostream>//header file

using namespace std;

class Window //defining a class Window

{

private:

int width, height;//defining integer variable

public:

friend ostream& operator << (ostream& stm, Window& width)//defining a friend function that takes two parameters

{

return stm<<"a ("<<width.width<<" x "<<width.height<<") window"; //use return keyword that return its values

}  

Window(int width, int height): width(width), height(height)//defining parameterized constructor that inherit width and height in its parameters  

{}

};

int main() //Main method

{

Window w(80,90);//calling class constructor

cout<<w;//print object value

return 0;

}

Output:

a (80 x 90) window

Explanation:

In the above code, a class "Window" is defined that uses a friend function "ostream& operator" is declared that uses the "ostrea&" as a data type to hold two-variable "stm and w" in its parameter, and declared the parameterized constructor to hold value by inheriting width and height in its parameters.

Inside the main method, a class object is created that calls the constructor and uses the print method to print object value.

7 0
3 years ago
I need help. People who know computer science. I have selected a word from the first 1000 words in my dictionary. Using the bina
Rudiy27

Answer:

14

Explanation:

8 0
3 years ago
In early Oklahoma, __________ tribes were most nomadic. A. hunting B. farming C. semi-sedentary D. agricultural Please select th
denpristay [2]

Answer:

A

Explanation:

They needed to follow the food/buffalo

5 0
3 years ago
Other questions:
  • Manuel is working on a project in Visual Studio. He wants to keep this program showing on the entire desktop, but he also needs
    7·1 answer
  • Write a statement that terminates the current loop when the value of the int variables x. and y.are equal
    12·1 answer
  • ___ are limited computers because they are placed inside devices which require specific computing functions
    11·1 answer
  • Jeff is a financial assistant. He needs to create a document for his client that tracks her stocks and calculates the loss or ga
    10·2 answers
  • 1. What is Java SE?
    11·2 answers
  • ASAP FAST PLSKara is currently creating a storyboard for her web site. Which step of the web design process is she in? Coding Pl
    9·2 answers
  • A security administrator is reviewing the following information from a file that was found on a compromised host: Which of the f
    9·1 answer
  • Which organization publishes a handbook that describes various occupations? U.S. Department of Defense U.S. Department of Agricu
    15·1 answer
  • Who loves you tube , anyone?
    10·2 answers
  • 7. Malware could A. cause a system to display annoying pop-up messages B. be utilized for identity theft by gathering personal i
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!