1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lions [1.4K]
3 years ago
6

How is hashing used?

Computers and Technology
1 answer:
Aliun [14]3 years ago
3 0

Answer: Its A. used to protect the transmission of software and large files to be downloaded

Explanation: Hashing is an algorithm that calculates a fixed-size bit string value from a file. A file basically contains blocks of data. Hashing transforms this data into a far shorter fixed-length value or key which represents the original string. The hash value can be considered the distilled summary of everything within that file. A good hashing algorithm would exhibit a property called the avalanche effect, where the resulting hash output would change significantly or entirely even when a single bit o...

You might be interested in
Which of the following office online apps is most effective for creating multi media presentation
Brrunno [24]
Google slides is the best out there
3 0
3 years ago
Read 2 more answers
Linux distributions overview? information​
disa [49]

Answer:

Debian

Arch Linux

Ubuntu

Fedora

Manjaro

Linux Mint

Elementary OS

openSUSE

Explanation:

6 0
3 years ago
Consider an array of integers consisting of the numbers: 8 12 19 32 45 55 67 72 89 90 92. Suppose the binary search algorithm is
ankoles [38]

Answer:

Answered below

Explanation:

Index of the first element compared to the key is 5. The element itself is 55.

This index is evaluated by the addition of the index of the first element which is 0(zero) and the the index of the last element which is 10.

( Index of the last element is determined by subtracting the one from the total number of elements)

After the addition, the result is divided by 2 to get the first index from which the binary search begins.

firstIndex = 0

lastIndex = array.length - 1

midpoint = (firstIndex + lastIndex) / 2

6 0
3 years ago
The good example of pivoting is changing thedimensions along the axis.? True? False
ollegr [7]

Answer:

False

Explanation:

The good example of pivoting is NOT changing the dimensions along the axis.

5 0
3 years ago
Complete the sentence.
mojhsa [17]

Answer:

its a network

Explanation:

that is how it is called

7 0
3 years ago
Other questions:
  • Evaluate the following expressions.
    10·1 answer
  • Organizational independence in the processing of payroll is achieved by functional segregations that are built into the system.
    6·1 answer
  • Setting up network encryption involves
    5·1 answer
  • A computer ____ is the amount of data (typically measured in bits or bytes) that a cpu can manipulate at one time.
    8·1 answer
  • E-mail messages, instant messages (IMs), or text messages sent and/or received within an organization a. are not included on a r
    9·1 answer
  • What role do computer play in law and order​
    6·1 answer
  • Outline 3 computer system problem that could harm people and propose the way avoid the problem​
    12·1 answer
  • Service and software companies typically have a high return-on-assets ratio because they require lower blank as compared to manu
    11·2 answers
  • Briefly the conceptual model of effective computer based instruction for adults outlining three units (output, Process and input
    9·1 answer
  • What software can be used for remote operation of a sunsdr2 dx?.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!