I beleive anything to do with manage
Answer:
Explanation:
The following code is written in Java. It creates the Rectangle class with the height and width variables. The constructor takes these variables as parameters to create Rectangle objects. It creates the get_perimeter method that sums up two of each side in order to get the perimeter of the Rectangle. A get_area method multiplies the height by the width to get the area. Finally, a resize method takes in a double factor variable and multiplies the height and the width by the factor to get a resized Rectangle object.
class Rectangle {
double height, width;
public Rectangle(double height, double width) {
this.height = height;
this.width = width;
}
public double get_perimeter() {
return (this.height + this.height + this.width + this.width);
}
public double get_area() {
return (this.height * this.width);
}
public void resize(double factor) {
this.height *= factor;
this.width *= factor;
}
}
Answer: Explanation:
Salting alters the hash of a password so that it does not physically match the hash of another password. A salt and password are concatenated and processed with a cryptographic hash function. Salt prevents use of rainbow and hash tables to attacking and cracking passwords.
For example, a user has the password, "password000" and is put through a SHA1 hash. In the password database, all of the users with the password "password000" will have the exact same hash, because of the nature of hashing functions. So, if an attacker breaches the database and brute force the password of the user mentioned above, he could look for all the hashes that match the original user's and would know their passwords are also "password000".
By applying a salt, the password hashes would no longer be identical to one another, even though the actual password is still the same. This requires the attacker to go in and attempt to brute force the second password (which has a different salt), even though it may be the same as the first.
In conclusion, it prevents an attacker from uncovering one password and subsequently uncovering multiple others.
Answer:
it is important for software to be compatible with your operating system so that you can use the software you acquired. The complications you may encounter if your software is not compatible with your operating system would be error codes, money wasted, and/or possible system changed that you do not want to change since it wouldn't be appropriate for your operating system.
Explanation:
Incompatible software is not something you should use with your operating system.