1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ElenaW [278]
3 years ago
7

Which of the following is not a use of a hash function

Computers and Technology
1 answer:
soldi70 [24.7K]3 years ago
7 0

Answer:

the answer would be there

Explanation:

You might be interested in
3.1.1 What type of goods are car radio and remote control.​
Nuetrik [128]

Answer:

Radio Controlled cars .

4 0
3 years ago
What allows multiple computers to join the same network
Lena [83]
A hub can be used to connect multiple computers and networks.
6 0
3 years ago
Which of the following would allow for the QUICKEST restoration of a server into a warm recovery site in a case in which server
adelina 88 [10]

Answer: C. Differential backup

Explanation: There are several ways od ensuring the preservation and storage of data even cases of disaster, one of such ways is data data mirroring which allows data to be replicated or copied in real time and several backup options. In cases where there there is need to restore a server, the warm recovery site provides a data or disaster recovery option used to mitigate the effect of data loss on organization. In the absence of data mirroring, differential backup option, provides the quickest recovery option as it only requires changes in the data stored after the last full backup. These speed experieced should be expected due to the relatively low data been dealt with rather than the entire data.

5 0
3 years ago
Hiding/masking personal identifiers from a data set, so that the data set can never identify an individual, even if it is correl
Anettt [7]

Hiding/masking personal identifiers from a data set, so that the data set can never identify an individual, even if it is correlated with other data sets is known as anonymization.

<h3>What is anonymization?</h3>

The term anonymization is known as data masking and it is the standard solution in the case of data pseudonymisation. It is generally recognised by using masking and data is de- sensitised also that privacy could be maintained and private information remains safe for the support.

Data is generally identified by using masking and data is de- sensitised also that privacy could be maintained and private information remains safe for the support.

Therefore, Hiding/masking personal identifiers from a data set, so that the data set can never identify an individual, even if it is correlated with other data sets is known as anonymization.

Learn more about anonymization here:

brainly.com/question/4268168

#SPJ4

5 0
2 years ago
How to transfer photos from iphone to iphone?
STALIN [3.7K]
If you have icloud then you can transfer them.
7 0
3 years ago
Read 2 more answers
Other questions:
  • Basic rule for java languague
    13·2 answers
  • Identifies the row and column that forms the cell
    11·1 answer
  • Describe the procedure for creating a table or spreadsheet in a presentation slide.
    13·1 answer
  • A collection of realated files is called a
    12·1 answer
  • 5. How would you describe the relationship between blocks of code and commands?​
    14·2 answers
  • Betty set up an account on a popular social networking website. she wants to know whether the privacy policy is effective for he
    14·1 answer
  • What does a coder do on a daily basis?
    8·1 answer
  • In which of the following scenarios would you choose to embed versus import data?
    8·1 answer
  • How do we make a acount
    15·2 answers
  • Bob The Penguin is a real you-tuber, and he plays Mine-craft. Who is his owner?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!