It is targeted at one person specifically. More work for the attacker, but higher chances of obtaining sensitive information.
It would be C, because the other ones would be breaking the law. using the horn over and over again is annoying. cell phone is distracted driving. driving slow than the speeding limit is against the law. so the only good choice is C because following the laws will not get you in trouble.
Assuming they all use the same basic algorithm, what might it be SHA-1.
c. SHA-1
<u>Explanation:</u>
As solution hash value for system will used only 160 bit even though performance is bit slower. Normally SHA-1 method been used. Basically there four methods
MD5 is a methods where it checked regularly whether the file system or altered or not. RIPEMD is a method where it store or converts value to 160 bits. SHA1 methods following some security algorithms where it keeps bits in 160 bits with some security crypto or signature
SHA2- this method following some security algorithms where it keeps bit in 256 bits and we have sha384 and sha512. SHA 2 method is not used now days.