1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aleksklad [387]
3 years ago
11

When authenticating a user's password, the password supplied by the user is authenticated by comparing the ____ of the password

with the one stored on the system.
Computers and Technology
1 answer:
Bas_tet [7]3 years ago
5 0

Answer:

Hash.

Explanation:

An authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification. Smart cards, digital certificates, picture passwords, and biometrics are generally used to perform an authentication in the field of computer.

Hence, when authenticating a user's password, the password supplied by the user is authenticated by comparing the hash of the password with the one stored on the system.

In Computer science, a hash function can be defined as any function which is used to map data by accepting a block of data with variable length size or arbitrary size as input to produce a fixed size hash values or codes.

Generally, when a block of data (input) of arbitrary size is hashed, the resulting hash values or codes is usually smaller than the input data. Thus, hash functions are considered to be a compression of data and as a result, sometimes called compression functions. Basically, the block size of a hash function typically ranges from 128 bits to 512 bits.

You might be interested in
It is generally safe to download mobile apps from<br>unknown sources.​
RUDIKE [14]

Answer:

no

Explanation:

because it could be a scam

6 0
3 years ago
Read 2 more answers
An IP packet to be transmitted by Ethernet is 60 bytes long, including all its headers. If LLC is not in use, is padding needed
salantis [7]

Answer:

No padding

Explanation:

64 bytes is taken as the minimum Ethernet frame, this encompass checksum as well as addresses in the Ethernet frame header and length field. while the maximum Ethernet frame is 1518 bytes, any minimumEthernet frame that is short compare to that will need receiving stations to interpret it as a collision. The question specified that the IP packet to be transmitted by Ethernet as 60 bytes long. The header fields here can occupy 18 bytes, Then total frame size becomes 78 bytes. With the total frame size of 78 bytes(60 bytes+ 18 bytes) we can see it has exceeded the 64-byte minimum. Hence there is no padding used.

6 0
3 years ago
QUESTION 1 _____ is a type of data encryption that enables users of the Internet to securely and privately exchange data through
valkas [14]

Answer:

The correct answer to the following question will be Option B (Public key infrastructure).

Explanation:

This seems to be a program that allows an individual to deliver an encrypted message or file through some kind of public key that can be unlocked by the intended receiver using another key or code, almost always a private or personal key.

  • This is a collection of functions, rules, equipment, applications, and methods required to develop, maintain, deliver, utilize, save, and withdraw digital credentials, and handle encryption with the public key.
  • This safeguards against hacking or interference with customer information or data.

6 0
3 years ago
If a linux installation ends abnormally and the screen displays a fatal signal 11 error, what type of error has occurred?
artcher [175]
The installation would have crashed or failed
6 0
4 years ago
A device combined with a switch, router, and wireless access point is called what?
ra1l [238]

It is called a wireless router!

8 0
3 years ago
Read 2 more answers
Other questions:
  • What office application has animations on the home ribbon?
    7·2 answers
  • ________ software helps run the computer and coordinates instructions between other software and the hardware devices.
    7·1 answer
  • You are in charge of the IT division for a company that has 1,048,576 customers. Your boss asks you to decide between buying a d
    14·1 answer
  • Machinery with rotating or reciprocating parts that are within seven feet of the floor or working platform requires what additio
    7·1 answer
  • Of the listed principles, which one states that multiple changes made to computer systems shouldn’t be made simultaneously?
    9·1 answer
  • You need to write a class called SingleItemBox (in a file called SingleItemBox.java that you create). This class has a construct
    6·1 answer
  • Write a function named word_count that accepts a string as its parameter and returns the number of words in the string. A word i
    10·1 answer
  • Which career qualification is unique to the Energy Transmission career pathway and not to the Energy Distribution pathway? color
    10·2 answers
  • Please Complete in Java a. Create a class named Book that has 5 fields variables: a stock number, author, title, price, and numb
    10·1 answer
  • What report provides data on how specific sections of a website performed?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!