what are the characteristics needed in a secure hash function?​

Answers

Answer 1
Cryptographic hash functions are utilized in order to keep data secured by providing three fundamental safety characteristics: pre-image resistance, second pre-image resistance, and collision resistance.
Answer 2

The characteristic needed in a secure hash function is image resistance functions.

What are the characteristics?

Characteristics refer to any feature or trait of any object which provides any information about the concept. These are unique in nature and makes difference with one another.

A group of cryptographic operations called Secure Hash Algorithms is designed to safeguard data. It functions by hashing the data to change it. It applies a severe value to a text before using a private key to encrypt the hash code.

One of a good hash function's essential characteristic include  The data being hashed completely determines the hash result, and the hash function uses all of the input data.

The characteristics necessary for a secure hash function are Avoiding collisions Resistance to the preimage and subsequent resistance to the preimage.

Learn more about the Secure Hash function, here:

https://brainly.com/question/2642496

#SPJ6


Related Questions

Which step is common to both creating a new document and saving a document?

Answers

Answer:

clicking the File tab. clicking the New tab. clicking the Save As tab.

Explanation:

If num1 and num2 are the same, print equal.

Answers

num1 = some value

num2 = some value

if num1 == num2:

   print("equal")

You just need to provide the values for the numbers. I hope this helps!

explain why it is wise to remember your social security number

Answers

If you know your number, you may never need your card again. It is the number, not the card, that is most important. Your Social Security number is nine digits, that is only two digits more than a phone number. If you don't know it by heart, now is a great time to commit it to memoryy

It is vital to remember your social security number as one can work or go places cardless without always carrying the card around if you are able to memorize the number.

What is a Social Security number?

A Social Security number is known to be the number given to citizens of a country. It is vital because one need it if they want to get a job.

The use of Social Security is one that can give us some benefits and one can use it to get some government services. It is good that one should keep their Social Security card in the right place.

Learn more about social security number from

https://brainly.com/question/2149712

Write a program that uses the conversion specifier g to output the value 9876.12345. Print the value with precisions ranging from 1 to 9.

Answers

Answer:

Written in C++

#include <stdio.h>

int main(){

   double value = 9876.12345;

   printf("1: %.1g\n", value);

   printf("2: %.2g\n", value);

   printf("3: %.3g\n", value);

   printf("4: %.4g\n", value);

   printf("5: %.5g\n", value);

   printf("6: %.6g\n", value);

   printf("7: %.7g\n", value);

   printf("8: %.8g\n", value);

   printf("9: %.9g\n", value);

   return 0;

}

Explanation:

This declares and initializes value as double

   double value = 9876.12345;

This prints the first precision

   printf("1: %.1g\n", value);

This prints the second

   printf("2: %.2g\n", value);

This prints the third

   printf("3: %.3g\n", value);

This prints the fourth

   printf("4: %.4g\n", value);

This prints the fifth

   printf("5: %.5g\n", value);

This prints the sixth

   printf("6: %.6g\n", value);

This prints the seventh

   printf("7: %.7g\n", value);

This prints the eight

   printf("8: %.8g\n", value);

This prints the ninth

   printf("9: %.9g\n", value);

The precision is printed using the following syntax: printf("%.ag\n", value);

Where a represents the number of digits to print

what is a decryption key?​

Answers

Answer:

A decryption key is a digital information used to recover the plain text from the corresponding ciphertext by decryption.

Explain the factors affecting computer performance

Answers

Answer:

They include: the speed of the CPU, the space on the hard disk, the size of the RAM, the type of the graphics card, the speed of the hard disk,, if the computer is multitasking, the defragmenting files

One friend claims that a dual-core system runs at twice the speed as a single-core system; another friend disagrees by saying that it runs twice as many programs at the same time; a third friend says it runs twice as much data at the same time. Explain who is correct and why?

Answers

Answer:

the first friend

Explanation:

It is important to remember that a core is the brain of the CPU (central processing unit), which means one who has a dual-core is having "a dual brain" to process information faster.

Consider also, IT experts often acknowledge that in terms of speed of execution, it is proven that, "dual-core systems" are faster (even twice faster) than a "single-core system". The other friends were wrong because they disagreed with a widely accepted fact that dual-core is faster than single-core; and of course, we know that without them being faster they can't run twice the applications and twice the data.

Therefore, we can make the conclusion that the first friend's response is correct.

14 Convert the
following binary
numbers to decimal
0011​

Answers

Answer:

.

Explanation:

The answer to this is 3

Question 3: Consider the multiplexer to the right. With F(x..Z) as output
function.
Fill in the truth table of F.
1 -
0
N
F
1
mux
2
0 -
3
X Y
X Yz
F
0 0 0 0
0 0 1 0
0 1
011
1100
1 0 1
1 1 0
1 1 1
HA
I

Answers

Answer:

1-

Explanation:

Alexis has six different pieces of jewelry to show and describe

Answers

Answer:

The answer to this question is given below in the explanation section

Explanation:

This question is not complete and the completed question is given below:

Alexis has six different pieces of jewelry to show and describe on a web page. Two are gold, and the rest are silver. Based on the principles of proximity, how would she display these pieces on her page?

She would separate each and provide some distance between them She would mix the pieces and keep them all close together She would make two columns of jewelry with an equal number of  pieces in each She would group the gold together, and the silver together

Based on the principle of proximity, the correct answer to this question is:

She would group the gold together, and the silver together.

As you know that the principle of proximity states that things that are close together appear to be more related than things that are spaced farther apart. So based on this principle she needs to make two groups gold and silver. So, based on the proximity principle, she would group the gold together, and the silver together.  

Write a single SQL statement to produce each of the following.

a. For each customer order, list the order id, order date, order_source_id source description, and the first and last name of the customer.
b. For each customer order, list the order id, order date, meth_pmt, the first and last name of the customer placing the order.
c. For each line in shipment_line, display the shipment_id, inv_id, ship_quantity, date_expected and date_received.

Answers

Answer:

a. SELECT order_id, order_date, order_source_id, source_description, first_name || last_name AS customer_name

        FROM customer_order;

b. SELECT order_id, order_date, meth_pmt, first_name || last name AS customer_name

        FROM customer_order;

c. SELECT shipment_id, inv_id, ship_quantity, date_expected, date_received

       FROM shipment_line;

Explanation:

When using SQL statements to display a certain amount of information, the SELECT syntax is used. It is written as;

          SELECT X, Y, Z

             FROM alphabets;

The SELECT statement is used to list the variables to be displayed which are usually separated by a coma.

The FROM indicates the table from which the variables should be extracted from.

The ; sign signifies the end of an SQL statement and that you want your query to be run

This "first_name || last_name AS customer_name" tells SQL to combine the first and last name of customers and display them as customer_name.

       

Write a calculator program that will allow only addition, subtraction, multiplication & division. Have the
user enter two numbers, and choose the operation. Use if, elif statements to do the right operation based
on user input. using python

Answers

num1 = float(input("Enter the first number: "))

num2 = float(input("Enter the second number: "))

operation = input("Which operation are you performing? (a/s/m/d) ")

if operation == "a":

   print("{} + {} = {}".format(num1, num2, num1+num2))

elif operation == "s":

   print("{} - {} = {}".format(num1, num2, num1-num2))

elif operation == "m":

   print("{} * {} = {}".format(num1, num2, num1*num2))

elif operation == "d":

   print("{} / {} = {}".format(num1, num2, num1/num2))

I hope this helps!

In which of the following scenarios would you choose to embed versus import data?
A.)You do not want to save the original data sources.
B.)You want to maintain connections with external files
C.)You want to reduce file size

Answers

Answer:

B.)You want to maintain connections with external files

Explanation:

Define a function perimeter(base, height) that returns the perimeter of a rectangle with side lengths base and height

Answers

Answer:

int perimeter(base,height)

{

int perimeter_of_rectangle;

perimeter_of_rectangle= 2(base+height);

return (perimeter_of_rectangle);

}

Explanation:

Lets name the function perimeter. It has two parameters base and height.

The function will have return type. In this case I am taking int but it can be float as well.

The function would be:

int perimeter(base,height)

{

int perimeter_of_rectangle;

perimeter_of_rectangle= 2(base+height);

return (perimeter_of_rectangle);

}

what are the steps involved in adding headers and footers to a Microsoft word document. ​

Answers

hey!!

your ans is here...

steps :

1.Click on insert tab.

2.Click on the header button or footer button.

suppose u have click on header..

3. A list of various header styles appears. Now u can select the required style.

Thanks

Hope it helps u.. mark as brainlist..

PLZZZZZZZZZZZZZZZ HELP ME OUT!!!!! I SICK AND TIRED OF PEOPLE SKIPING MY QUESTION WHICH IS DUE TODAY!!!!ANSWER THEM ALL PLZ

DIABETES: What causes this condition? *

DIABETES: What are the symptoms of this condition? *


DIABETES: Does this condition explain why Elisa may be tired? (Why or why not?) *

DIABETES: Which molecule is most likely affected by this condition: oxygen, glucose, or amino acids? *

ANEMIA: What causes this condition? *

ANEMIA: What are the symptoms of this condition? *

ANEMIA: Does this condition explain why Elisa may be tired? (Why or why not?) *


ANEMIA: Which molecule is most likely affected by this condition: oxygen, glucose, or amino acids? *

Answers

Answer:

Explanation:

Being overweight, eating unhealthy, and not exercising can cause diabetes.

Some symptoms of diabetes are being sleepy, being very thirsty, losing weight without trying to, being very hungry, having dry skin, and your hands or feet being numb are some symptoms.

This conditions does explain why Elsa may be tired because tiredness is a symptom of diabetes.

Glucose is most likely affected by diabetes.

Having a shortage of iron in your body causes anemia

Symptoms of anemia are weakness, fatigue, shortness of breath, pale skin, chest pain, and dizziness.

Anemia may be the reason Elisa is tired because it causes fatigue and weakness.

Oxygen is most likely affected by anemia.

The Fibonacci sequence is a famous sequence in mathematics. The first two elements are defined as 1, 1. Subsequent elements are defined as the sum of the preceding two elements. For example, the third element is 2 (=1+1), the fourth element is 3 (=1+2), the fifth element is 5 (=2+3), and so on.

Required;
Use a for loop to create a vector which contains the first 50 Fibonacci numbers.

Answers

Answer:

Written using C++

#include <iostream>  

#include <vector>  

using namespace std;  

int main() {  

vector<int> fibb;  

int n1 = 0;

int n2 = 1;

int temp;

for (int nm= 0; nm < 50;nm++) {

 fibb.push_back(n1);

 temp = n1 + n2;

 n1 = n2;

 n2 = temp;

}

for (int nm= 0; nm < 50;nm++) {

{

 cout<<fibb.at(nm)<<" ";

}

return 0;  

}

Explanation:

#include <iostream>  

#include <vector>  

using namespace std;  

int main() {  

This line declares the vector as integer

vector<int> fibb;  

This line initializes the first term to 0

int n1 = 0;

This line initializes the second term to 1

int n2 = 1;

This line declares a temporary variable

int temp;

The following iteration populates the vector with first 50 Fibonacci series

for (int nm= 0; nm < 50;nm++) {

This push an entry into the vector

 fibb.push_back(n1);

The following generate the next Fibonacci element

 temp = n1 + n2;

 n1 = n2;

 n2 = temp;

}

The following iteration prints the generated series

for (int nm= 0; nm < 50;nm++) {

 cout<<fibb.at(nm)<<" ";

}

return 0;  

}

A local bank has just one branch. It sets up a peer-to-peer network for all devices on the system. The bank would like to be able to have one technician administer the entire network from his location outside the bank without having to go to the bank each time there is a problem. Will this be possible for the technician?

A. It will not work because it is not possible to have the technician administer from one single location.

B. It will not work because the bank needs to use a server in a central location to allow for the remote access.

C. It will work as long as a LAN network is established to facilitate the communication between devices.

D. It will work if it uses a WAN to bring in all of the LANs to one central location.

CORRECT ANSWER IS B!

Answers

B
Good luck hope you get a good grade

It will not work because the bank needs to use a server in a central location to allow for the remote access, hence option B is correct.

What is a peer-to-peer network?

A distributed application architecture known as peer-to-peer computing or networking divides jobs or workloads across peers.

Peers are equally qualified and capable members of the network. They are referred to as the nodes in a peer-to-peer network.

In the hypothetical situation, the technician is unable to manage the complete network from outside the bank. Every time a problem arises, the technician must visit the bank.

Therefore, in order to give them the desired remote access, I need a server that is situated in a strategic location, hence option B is correct.

Learn more about peer-to-peer network, here:

https://brainly.com/question/10571780

#SPJ5

Choose the function described.
The
function deletes all items from a list.
delete
remove
clear

Answers

Answer:

clear

Explanation:

Answer:

just did the test and the answer is c clear

Explanation:

Which two statements are true about the impact of emerging technology on society?

Emerging technologies have only provided benefits to developed countries.

Wireless technologies have not reached the point where they can provide internet to remote areas.

Satellite communication has evolved to provide communication to remote parts of the world.

Most technologies have reached their saturation point and are not seeing further evolution.

Emerging technologies, like any other technology, can be misused.

Answers

Answer: Satellite communication has evolved to provide communication to remote parts of the world. And Emerging technologies, like any other technology, can be misused. would be correct.

Explanation: According to Britannica, "in telecommunications, the use of artificial satellites to provide communication links between various points on Earth. Satellite communications play a vital role in the global telecommunications system. Approximately 2,000 artificial satellites orbiting Earth relay analog and digital signals carrying voice, video, and data to and from one or many locations worldwide." So satellite communications can be [pretty much used anywhere if there is a receiver on the ground. As for technology being misused, anything that is relatively new can be abused or damaged with malicious intent.

Hope this helped please mark it as the brainliest!

Answer:

The correct answers are:

Satellite communication has evolved to provide communication to remote parts of the world.

Emerging technologies, like any other technology, can be misused.

Explanation:

I got it right on the Edmentum test.

How many passes will it take to find the 20 in this list? (python)

10, 12, 14, 16, 18, 19, 20

3

1

2

4

Answers

Answer:

1

Explanation:

What do you mean by a pass? A pass through each number in the list?

for x in numLst:

    if x == 20:

         return True

This would run through the list once, as you're just checking if each element is 20 in this loop.

Answer:

2

Explanation:

on edge right

Adult male heights are normally distributed with a mean of 70 inches and a standard deviation of 3 inches. The average basketball player is 79 inches tall. Approximately what percent of the adult male population is taller than the average basketball player? (2 points)

Answers

Answer:

16

Explanation:

Which company is producing laptops nowadays? *
Cute
Aspire
Dell
Innovative

Answers

Answer:

dell

thanks for points

What is the space complexity of the algorithm?ArithmeticSeries(list, listSize) { i = 0 arithmeticSum = 0 while (i < listSize) { arithmeticSum = arithmeticSum + list[i] i = i + 1 } return arithmeticSum}

Answers

Answer:

O(n) which is a linear space complexity

Explanation:

Space complexity is the amount of memory space needed for a program code to be executed and return results. Space complexity depends on the input space and the auxiliary space used by the algorithm.

The list or array is an integer array of 'n' items, with the memory size 4*n, which is the memory size of an integer multiplied by the number of items in the list. The listSize,  i, and arithmeticSum are all integers, the memory space is 4(3) = 12. The return statement passes the content of the arithmetic variable to another variable of space 4.

The total space complexity of the algorithm is "4n + 16" which is a linear space complexity.

cell d1 contains the value 7.877 you want cell d1 to display this value as 7.9 how can you accomplish

Answers

Answer:

You round?

Explanation:

The round function in excel can be used to change the value of 7.877 to 7.9 by writing the following code in cell d1 ; =round(7.877, 1)

The round function is used in excel to approximate numbers to a certain number of decimal places.

The round function takes in two arguments ; the number to be rounded and the number of decimal places.

To obtain a value of 7.9 ; round 7.877 to 1 decimal place., the value after the first decimal is above 5 ; it is rounded to 1 and added to the first decimal value.

Therefore, the round function could be used to accomplish the above task.

Learn more :https://brainly.com/question/17566733

Which statements are true about different software?

You can use a word processor to write, edit, print, and perform a variety of modifications on a document. Word processors work with entirely text-based documents without images or video. Spreadsheet programs enable users to perform statistical functions and create charts and graphs for data analysis. Managers can use database software to discuss financial performance with the help of slideshows. Graphics software, audio- and video-editing software, and media players are all examples of system software.

Answers

Answer:

You can use a word processor to write, edit, print, and perform a variety of modifications on a document.

Spreadsheet programs enable users to perform statistical functions and create charts and graphs for data analysis.

Explanation:

Took the test

Write modified code that will generate a random number between 0 and 255 when a button is pressed and will write the number to the serial monitor as well as to the receiver Arduino.

Answers

Solution :

#include<LiquidCrystal.h>

int value;

int flag;

LiquidCrystal lcd(12, 11, 5, 4, 3, 2);

void setup()

{

lcd.begin(16, 2);

Serial.begin(9600);

}

void loop()

{

value=digitalRead(7);

  if(value==0){

flag=1;}

  if(value==1){

flag=~flag;}

  if (flag==1){

lcd.setCursor(0,0);    

  lcd.print("number is");

lcd.setCursor(2,1);    

lcd.print(random(0, 255));

delay(1000);

}

  else{

lcd.setCursor(0,0);

lcd.print("Not Pressed");

delay(1000);

lcd.clear();}

}

Allows users to manually enter functions or formulas
5 points
Column
Row
Cell reference
Formula bar
Location of a cell (for example, A3)
5 points
Workbook
Spreadsheet
Cell reference
Spreadsheet title
Labeled with numbers within a spreadsheet; intersects with columns
5 points
Merge
Help menu
Column
Row
Individual rectangle within a spreadsheet
5 points
Cell
Row
Column
Formula bar
Displays the name of a spreadsheet
5 points
Spreadsheet title
Formula bar
Workbook
Column
A document that arranges data in a series of columns and rows
5 points
Workbook
Help menu
Cell reference
Spreadsheet
Refers to a group of cells within a spreadsheet
5 points
Cell range
Column
Cell
Workbook
Combining two or more cells together to form one larger cell
5 points
Spreadsheet title
Cell range
Merge
Workbook
Provides assistance to users regarding how to use a spreadsheet program
5 points
Spreadsheet
Help menu
Formula bar
Cell reference
Labeled with letters within a spreadsheet; intersects with rows
5 points
Column
Cell
Row
Cell range

Answers

sorry no one can understand what you are asking you should ask a simpler question where people would like to answer

One way to generalize a function is to replace a variable with a value. Select one: True False

Answers

Answer:

false

Explanation:

false

The statement that one way to generalize a function is to replace a variable with a value is false.

A function simply means a block of organized, reusable code which is used in performing related action.

It should be noted that functions allow the programmer to generalize and encapsulate sections of code. A way to generalize a function is not to replace a variable with a value. Therefore, the information given is false.

Read related link on:

https://brainly.com/question/19634631

Hello again, just need help debugging-I honestly have no idea how the "isSpace" etc methods work and I've tried various syntaxes (string name, Character., etc.) to no avail. Also getting errors for the c= sections for converting between char, string, and boolean which I understand, just dont know how to fix. I'm aware I could condense my initial variables, I just like them laid out. The code aims to count lowercase vowels, all consonants, spaces, and punctuation. Anything else will get thrown into a misc count.


import java.util.Scanner;

public class MyClass {

public static void main(String args[]) {
Scanner s=new Scanner(System.in);
System.out.println("input the string");
String as=s.nextLine();

int cons=0;

int a=0;

int e=0;

int i=0;

int o=0;

int u=0;

int space=0;

int punc=0;

char c;

int misc=0;

for(int k=0;k(LESS THAN)as.length();k++){
if(as.isSpace(as.charAt(i))){
space++;
}

else if(as.isConsonant(as.charAt(i))){

cons++;

}

else if(as.isPunctuation(as.charAt(i))){

punc++;

}

else if(as.isVowel(as.charAt(i))){

c=as.charAt(i);

if (c="a"){

a++;

}

else if(c="i"){

i++;

}

else if(c="e"){

e++;

}

else if(c="o"){

o++;

}

else if(c="u"){

u++;

}

else{

misc++;

}

}

else{

misc++;

}

}

System.out.println(a+" a's");

System.out.println(e+" e's");

System.out.println(i+" i's");

System.out.println(o+" o's");

System.out.println(u+" u's");

System.out.println(space+" spaces");

System.out.println(punc+" punctuations");

System.out.println(cons+" consonants");

System.out.println(misc+" misc. (uppercase vowels, etc.");


}

}

Answers

import java.util.Scanner;

public class JavaApplication81 {

   

   public static void main(String[] args) {

       Scanner s = new Scanner(System.in);

       System.out.println("Input the string");

       String as = s.nextLine();

       int cons = 0;

       int a = 0;

       int e = 0;

       int i = 0;

       int o = 0;

       int u = 0;

       int space = 0;

       int punc = 0;

       char c;

       int misc = 0;

       String punctuation = ".!,?";

       String consonants = "bcdfghjklmnpqrstvwxyz";

       for (int k = 0; k < as.length(); k++){

           c = as.charAt(k);

       if (Character.isWhitespace(c)){

           space ++;

       }

       else if (punctuation.indexOf(c) != -1){

           punc++;

       }

       else if (consonants.indexOf(c) != -1){

           cons++;

       }

       else if (c == 'a'){

           a++;

       }

       else if(c == 'e'){

           e++;

       }

       else if (c == 'i'){

           i++;

       }

       else if (c == 'o'){

           o++;

       }

       else if (c == 'u'){

           u++;

       }

       else{

           misc++;

       }

       

   }

       System.out.println(a+" a's");

       System.out.println(e+" e's");

       System.out.println(i+" i's");

       System.out.println(o+" o's");

       System.out.println(u+" u's");

       System.out.println(space+" spaces");

   

       System.out.println(punc+" punctuations");

       System.out.println(cons+" consonants");

       System.out.println(misc+" misc. (uppercase vowels, etc.");

   }

   

}

This is one example of how it could be done.

Other Questions
Who have any information about this form? Were the Cubans happy being a Spanish colony? What happened that allowed the Cubans to gain more freedom? Which represents the value of Point C on the number line? What is the m for this slope? Las plantasa crecimucho esta primavera.b. crecieronC. destruyeronPlease select the best answer from the choices provided B What can affect the properties of a substance? A. Only the arrangement of atomsB. Only the types of atoms C. Neither the arrangement nor the types of atomsD. The arrangement and types of atoms a._x2 _ 25How do you do this 7k-3=6k what does k equal Why is Mesopotamia often called "the breadbasket of the ancient world"? What is the source of almost all energy on Earth?o Earths hot coreo the Suno stored carbono moving waterPlease help. This question is for engenuity 2020! 5x-4y=-18 and x-4y=6 1) Find the perimeter of the followingpolygon8 ft.5 ft. Which shape is similar to shape I? A. B. C. D. 35 points As youve learned, one major theme in the story of Alices Adventures in Wonderland is the struggle of leaving childhood behind to become an adult. Keeping this theme in mind, consider how the film and the play reveal this theme. Which version do you believe does a better job of presenting it? Why? Write a paragraph of 75 to 100 words that explains your answer. Be sure to include details from both versions to support your answer. The earth is not your property alone.Its's as much ours as yours I will give barinlest im not playing im frfr Identify the domain of the relation {(1,9), (2,5) (4, 6), (7, 1), (2,4)} . Help please? Will mark correct and first answer as brainliest!! : ) what is the midpoint Can some make up a saying for ASTC? It needs to be funny!