1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liberstina [14]
2 years ago
11

Please help! Answers that do not relate to this topic will be REPORTED!

Computers and Technology
1 answer:
zmey [24]2 years ago
6 0

Answer:

answer for number A is

2. the ability to be  either relative or absolute

B. 2 bytes

C. in a buffer

Explanation:

You might be interested in
Donnell backed up the information on his computer every week on a flash drive. Before copying the files to the flash drive, he a
lubasha [3.4K]

Answer:

b. Risk of a potential breach in the integrity of the data on the flash drive

Explanation:

The corrupted or unreadable file error is an error message generated if you are unable to access the external hard drive connected to the system through the USB port. This error indicates that the files on the external hard drive are no longer accessible and cannot be opened.

There are several reasons that this error message can appear:

  • Viruses and Malware affecting the external hard drive .
  • Physical damage to external hard drive or USB memory .
  • Improper ejection of removable drives.
3 0
3 years ago
I cant figure this out, can I get some help?
Natalija [7]

Answer:

i think it is 25 0 33.

Explanation:

3 0
2 years ago
Which type of secondary storage has a fast reading access among the secondary storage​
Marrrta [24]

Answer:

RAM provides much faster accessing speed to data than secondary memory. By loading software programs and required files into primary memory(RAM), computer can process data much more quickly. Secondary Memory is slower in data accessing. Typically primary memory is six times faster than the secondary memory.

3 0
2 years ago
The principal object of a hash function is __________ .
abruzzese [7]

Answer:

a. data integrity

Explanation:

In Computer science, a hash function can be defined as any function which is used to map data by accepting a block of data with variable length size or arbitrary size as input to produce a fixed size hash values or codes.

Generally, when a block of data (input) of arbitrary size is hashed, the resulting hash values or codes is usually smaller than the input data. Thus, hash functions are considered to be a compression of data and as a result, sometimes called compression functions. Basically, the block size of a hash function typically ranges from 128 bits to 512 bits.

Some of the properties of a hash function are;

1. <em><u>Pre-image resistance</u></em>: this makes it practically impossible to reverse a fixed-size hash values to its initial arbitrary size. This property helps to maintain and enhance data integrity by making it difficult or impossible for an attacker to find the input data from a hash value.

2. <em><u>Second pre-image resistance</u></em>: this property makes it near impossible or very difficult to determine or decode another input data from a given set of input and hash values. Also, this helps to enhance data integrity.

3. <em><u>Collision resistance</u></em>: this is to make possible for all hash values to have a unique value. This simply means that, with this property it would be difficult for different input data to have the same hash value. Thus, it helps to create integrity in data management.

<em>Hence, with the aforementioned properties, the principal object of a hash function is data integrity.</em>

Hash functions in the computer world includes;

1. Message Digest (MD): it is a 128 bit hash function and comprises of the following; MD2, MD4, MD5, and MD6.

2. Secure Hash Function (SHA): it comprises of the following; SHA-0, SHA-1,SHA-2, and SHA-3.

3. Whirlpool: it comprises of the following; Whirlpool-0, Whirlpool-T, and Whirlpool. It is primarily a 512 bit hash function.

4. RACE Integrity Primitives Evaluation Message Digest (RIPEMD): it comprises of the following versions; RIPEMD, RIPEMD-128, and RIPEMD-160.

8 0
3 years ago
Mary needs someone to make sure her podcast is of high quality and sounds polished. Which of the following professionals should
DaniilM [7]

Answer:

C. Digital Audio Producer

Explanation:

C. is the only option where the professial deals specifically with sound/audio.

7 0
2 years ago
Read 2 more answers
Other questions:
  • Write a program that will predict the size of a population of organisms. The program // should ask the user for the starting num
    6·1 answer
  • The file extension of MS-Word document in office 2007 is?(a) .pdf (b) .doc (c) .docx (d) .txt
    5·2 answers
  • 1. Write a function that will ask the user to enter a value in dollars. The function should calculate and display the equivalent
    9·1 answer
  • Rachel wants to post content from digital cameras on the web. Which online tool will help Rachel to post and edit content on a w
    5·1 answer
  • You can post a Facebook status update from your smartphone. True or false?
    7·2 answers
  • A good CRM should Integrate marketing, sales, and customer support activities measuring and evaluating the process of knowledge
    13·1 answer
  • Please Help!
    13·1 answer
  • Write a method that takes a RegularPolygon as a parameter, sets its number of sides to a random integer between 10 and 20 inclus
    10·1 answer
  • Your friend has a great idea for a new app, and she shows you a document that outlines what the app will do. This document is an
    6·1 answer
  • When a computer is infected by a virus, _______.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!