menu
Qammunity.org
Login
Register
My account
Edit my Profile
Private messages
My favorites
You have been asked to implement a data integrity program to protect data files that need to be electronically downloaded by the sales staff. You have decided to use the stronges…
Ask a Question
Questions
Unanswered
Tags
Categories
Ask a Question
You have been asked to implement a data integrity program to protect data files that need to be electronically downloaded by the sales staff. You have decided to use the stronges…
asked
Nov 11, 2020
162k
views
2
votes
You have been asked to implement a data integrity program to protect data files that need to be electronically downloaded by the sales staff. You have decided to use the strongest hashing algorithm available on your systems. Which hash algorithm would you select
Computers and Technology
high-school
Georkings
asked
by
Georkings
8.3k
points
answer
comment
share this
share
0 Comments
Please
log in
or
register
to add a comment.
Please
log in
or
register
to answer this question.
1
Answer
0
votes
Answer:
SHA-1 is used in this case.
Step-by-step explanation:
Kelsey
answered
Nov 16, 2020
by
Kelsey
7.7k
points
ask related question
comment
share this
0 Comments
Please
log in
or
register
to add a comment.
← Prev Question
Next Question →
Related questions
asked
Oct 1, 2021
18.8k
views
How is hashing used? A. used to protect the transmission of software and large files to be downloaded B. used for authentication, digital signatures, and message authentication codes C. ecommerce protocols
Owise
asked
Oct 1, 2021
by
Owise
7.8k
points
Computers and Technology
high-school
1
answer
1
vote
18.8k
views
asked
Jul 25, 2021
108k
views
Hashing algorithms are used on evidence files to uphold the chain of custody in an investigation. Which of the following is NOT a hashing algorithm? A. SHA-256 B. MD5 C. DAT-1 D. SHA-1
Danielquokka
asked
Jul 25, 2021
by
Danielquokka
7.8k
points
Computers and Technology
college
1
answer
0
votes
108k
views
asked
Apr 6, 2024
215k
views
What method is used to protect the integrity of a message? A). hashing B). symmetric encryption C). asymmetric encryption D). stream cipher
Kostadin
asked
Apr 6, 2024
by
Kostadin
7.9k
points
Computers and Technology
high-school
1
answer
5
votes
215k
views
Ask a Question
Welcome to QAmmunity.org, where you can ask questions and receive answers from other members of our community.
9.4m
questions
12.2m
answers
Other Questions
“What does it mean when we “rework” copyrighted material?”
Seven basic internal components found in a computer tower
Please help me ! All you do is just put it it all in your own words ! Please this is for my reported card!i don't know how to put it in my own words because my English is not that good!
describe an advance in technology that makes life more enjoyable. what discoveries contribute to this technology?
Disadvantages of using animation in advertising? advantages and disadvantages of using animation for education? advantages and disadvantages of using animation in entertainment?
Twitter
WhatsApp
Facebook
Reddit
LinkedIn
Email
Link Copied!
Copy
Search Qammunity.org