1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
deff fn [24]
3 years ago
9

For hashing to work, it requires that

Computers and Technology
1 answer:
irinina [24]3 years ago
6 0

Answer:

C. Both of the above

Explanation:

A. because the a main purpose of hashing is to store a lot of information in a string of random letters

B. because it is a form of encryption, though not absolutely impossible to break. That's also why it was worded as: it must be hard to...

You might be interested in
Greg wants to check the amount of requests his website receives. What test can he use?
Alenkinab [10]

Answer:

D - Website load test

Explanation:

Just got it right

4 0
3 years ago
The point where a row and column intersect is called a/an A. cell. B. axis. C. element. D. table.
tino4ka555 [31]
The point where a row and column intersect is called a cell.

I hope this helped!
3 0
4 years ago
Read 2 more answers
All members within a class are by default
miv72 [106K]

Answer:

All the members within a class are by default are private. Private function in a class can access public function within a similar class. Private member formed the implementation of the class and also form the private interface of members within the class.

All the member of class can be access by function inside the class when it is declare as private.

For example:

class test

{     private:

   int a; // when test:a is private

     public:

   test() : a()  // a is accessible in test class  

}

8 0
3 years ago
One of your primary business objectives is being able to trust the data stored in your application. You want to log all changes
lord [1]

Answer:

C

Explanation:

Based on the information provided within the question it can be said that the best way to accomplish this would be to digitally sign each timestamp and log entry and store the signature. This is because each timestamp and log entry would be ran through a verification algorithm which would then be stamped with your digital signature that requires your private keys, thus preventing forgery.

4 0
4 years ago
Do the police check your mobile device during police checks?
Marat540 [252]
it depends............

4 0
3 years ago
Read 2 more answers
Other questions:
  • When are the malls going to open
    5·2 answers
  • How far is florida from oklahoma?
    10·2 answers
  • Write a SELECT statement that returns two columns: vendor_id and the largest unpaid invoice for each vendor. To do this, you can
    6·1 answer
  • Which of the following is least likely checked by the comprehensive component monitor?
    7·1 answer
  • Your desktop, Internet Explorer®, and the Media Player can be started from this area on most computers.
    10·2 answers
  • One interesting application of computers is to display graphs and bar charts. Write an application that reads five numbers betwe
    5·1 answer
  • . File systems do not maintain the attributes associated with the files. Select one: True False
    13·1 answer
  • Middleware is software used to: a. connect processes running on different computer systems across a network. b. integrate a comp
    8·1 answer
  • A college has 2.3 ratio of men to women in its student body you what is the ratio of women to men
    15·1 answer
  • Write a function named dice_eval that accepts two parameters representing numeric dice values and returns a string describing th
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!