1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dexar [7]
3 years ago
12

What is the primary hash algorithm used by the NIST project created to collect all known hash values for commercial software and

OS files
Computers and Technology
1 answer:
Stolb23 [73]3 years ago
7 0

Answer:

National Software Reference Library (NSRL).

Explanation:

NIST is acronym for National Institute of Standards and Technology and it's under the U.S. Department of Commerce. The NIST cybersecurity framework (CSF) is a powerful tool that provide guidelines for both the external and internal stakeholders of organization on how they can effectively and efficiently organize, manage, and improve their cybersecurity programs, so as to mitigate the risks associated with cybersecurity.

National Software Reference Library (NSRL) is the primary hash algorithm used by the National Institute of Standards and Technology (NIST) project created to collect all known hash values for commercial software and operating system (OS) files.

You might be interested in
Which of the following best describes the difference between the domain and path of a URL?
Lana71 [14]

Answer:

the first choice

Explanation:

8 0
3 years ago
¿Cuál es la potencia de una lámpara de incandescencia que se conecta a la red de 220 V, sabiendo que tiene una resistencia de 50
Juliette [100K]

Answer:

  • <u>1,000W</u> (rounded to one significant figure)

Explanation:

I will answer in English.

The question is:

  • <em>What is the power of a filament lamp that connects to the 220 V network, knowing that it has a resistance of 50 ohms?</em>

<em />

<h2>Solution</h2>

<em />

<em>Power</em>, <em>voltage</em>, <em>resistance</em>, and current, are related by either of the following equations:

  • P = V × I
  • P = R × I²
  • P = V² / R

Where:

  • P is power in watts (W)
  • R is resistance in ohms (Ω)
  • V is voltage in volts (V), and
  • I is current in amperes (A)

Since you know the voltage (<em>220V</em>) and the resistance (<em>50Ω</em>), you can use the last equation:

  • P = V² / R
  • P = (220v)² / (50Ω)
  • P = 968 W

Since the magnitude 50Ω has one significant figure, your answer should be rounded to one significant figure. That is <u>1,000W.</u>

7 0
3 years ago
Look at the options below. Which one is a simulation?
Elena-2011 [213]

Im going to guess the 2nd one.

The 1st one just shows how trees can make ____ and then goes to water, the sun, then the rain but it CAN be used as one.

The 2nd one seems to explain the best it can show about weather, water, landforms, the sun, and seems like a better one to choose.

5 0
3 years ago
The following code processes a file containing five positive numbers. What will the variable $result contain after the code is e
Tanzania [10]

Answer:

highest of five numbers in the file

Explanation:

  • This code reads the file "some-file.txt" and saves the result in variable "somefile"
  • The runs a for loop for a count of 5.
  • In each loop it compares the current value of the file with the value of the variable result and if the result is true it updates the value of the variable result.
  • At the end of this code the variable result will contain the highest value in the file "some-file.txt" and print it.

3 0
3 years ago
Prime numbers can be generated by an algorithm known as the Sieve of Eratosthenes. The algorithm for this procedure is presented
Sidana [21]

Answer:

const MAXNR=150;

let candidates = {};

for(let i=2; i<=MAXNR; i++) {

   candidates[i] = true;

}

for(let p=2; p <= MAXNR; p++) {

   if (candidates[p]) {

       process.stdout.write(`${p} `);

       // Now flag all multiples of p as false

       i=2;

       while(p*i <= MAXNR) {

           candidates[p*i] = false;

           i++;

       }

   }

}

4 0
3 years ago
Other questions:
  • Host A and B are directly connected with a 100 Mbps link. There is one TCP connection between the two hosts, and Host A is sendi
    14·1 answer
  • A. True
    5·1 answer
  • Which protocol do e-mail programs use to identify the file types of attached files?
    7·1 answer
  • This assignment requires you to write a program to analyze a web page HTML file. Your program will read one character at a time
    13·1 answer
  • This program will store roster and rating information for a soccer team. Coaches rate players during tryouts to ensure a balance
    5·1 answer
  • Fill in the blank with the correct response.
    10·1 answer
  • A(n) _____ is a firm that delivers a software application, or access to an application, by charging a usage or subscription fee.
    6·1 answer
  • A(n) _____ is created using the select and option elements that present users with a group of predefined possible values for the
    10·1 answer
  • To delete unnecessary files on a hard disk use software
    5·2 answers
  • We love silky. she is very honest join this by using conjunction ​
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!