1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aleksklad [387]
3 years ago
11

When authenticating a user's password, the password supplied by the user is authenticated by comparing the ____ of the password

with the one stored on the system.
Computers and Technology
1 answer:
Bas_tet [7]3 years ago
5 0

Answer:

Hash.

Explanation:

An authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification. Smart cards, digital certificates, picture passwords, and biometrics are generally used to perform an authentication in the field of computer.

Hence, when authenticating a user's password, the password supplied by the user is authenticated by comparing the hash of the password with the one stored on the system.

In Computer science, a hash function can be defined as any function which is used to map data by accepting a block of data with variable length size or arbitrary size as input to produce a fixed size hash values or codes.

Generally, when a block of data (input) of arbitrary size is hashed, the resulting hash values or codes is usually smaller than the input data. Thus, hash functions are considered to be a compression of data and as a result, sometimes called compression functions. Basically, the block size of a hash function typically ranges from 128 bits to 512 bits.

You might be interested in
MyProgramming Lab
Akimi4 [234]

Answer:

Explanation:

The following code is written in Python. It creates a method for each one of the questions asked and then tests all three with the same test case which can be seen in the picture attached below.

def alternating_list(lst1, lst2):

   lst3 = []

   for x in range(len(lst1)):

       lst3.append(lst1[x])

       try:

           lst3.append(lst2[x])

       except:

           pass

   if len(lst2) > len(lst1):

       lst3.extend(lst2[len(lst1):])

   return lst3

def reverse_alternating(lst1, lst2):

   lst3 = []

   if len(lst1) == len(lst2):

       for x in range(len(lst1) - 1, -1, -1):

           lst3.append(lst1[x])

           lst3.append(lst2[x])

   return lst3

def alternating_list_no_extra(lst1, lst2):

   lst3 = []

   max = 0

   if len(lst1) > len(lst2):

       max = len(lst2)

   else:

       max = len(lst1)

   for x in range(max):

       lst3.append(lst1[x])

       try:

           lst3.append(lst2[x])

       except:

           pass

   return lst3

4 0
3 years ago
The Company should use BLANK cables to provide Fast connectivity without electrical interference
Lisa [10]

they should use Ethernet! it offers fast and easy setup, and is just plug and play!

3 0
3 years ago
Liam noticed someone had accessed his social media account and made several posts without his knowledge. Which of the following
jok3333 [9.3K]

Answer:

Liam could

1) Change the password

Be sure to change the password to a "strong" one (containing lots of characters, numbers, symbols) so that way the password would be difficult to guess.

2) Avoid logging onto social media on public computers or WiFi connections.

Using public WiFi leaves you vulnerable to someone accessing your information through Internet traffic. If you do use public computers, just make sure to log out.

3) Avoid giving out account information to friends and avoid opening suspicious links and emails.

Opening suspicious links or emails could allow malware to infect your computer the moment you open them. Friends can unknowingly share these links that are designed to steal information.

I hope this helped <3 please lmk if there's anything more to add.

4 0
3 years ago
What is the simplest way to convert a decimal number in a binar one in c++?
Fiesta28 [93]
It's easy you need to use function for decimal in binary.
binary STD;
int STD_no;
STD=STD_No.ToBinary

4 0
3 years ago
Innovation made from establishment of abucas to the present 5th
Minchanka [31]

Answer:

Douglas-fir, spruce, true fir, beech, and maple are toward the top of the list for oxygen release.Douglas-fir, spruce, true ...

4 0
3 years ago
Other questions:
  • reate a class called Plane, to implement the functionality of the Airline Reservation System. Write an application that uses the
    5·1 answer
  • Implement the function pairSum that takes as parameters a list of distinct integers and a target value n and prints the indices
    11·1 answer
  • The idea generating technique most often used in writing business letter is ?
    9·2 answers
  • What is data? and types ??
    9·2 answers
  • What is the name of the amount of space between the content of a document and the edge of the page
    13·1 answer
  • What are some characteristics of filtering junk email in Outlook 2016? Check all that apply.
    10·2 answers
  • For the following C code assume k and m are passed in x3 and x4 respectively, while result is returned in x4. Compile this code
    14·1 answer
  • Desirable workplace habits and skills include:
    14·1 answer
  • What is the function for displaying differences between two or more scenarios side by side?
    11·2 answers
  • What is "mob of the dead"?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!