Hashing algorithms are used to address which of the following?

A. Confidentiality
B. Compatibility
C. Availability
D. Integrity


Answer: D. Integrity

Computer Science & Information Technology

You might also like to view...

LISP uses a notation known as ______.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A(n) ________ is an interactive graphical representation of the data in a PivotTable

Fill in the blank(s) with correct word

Computer Science & Information Technology

____ allows a user the ability to remotely connect to the database to retrieve information as a user different from that defined by the Web technology.

A. NEWUSER B. OPENUSER C. REMOTEDIAL D. OPENROWSET

Computer Science & Information Technology

If you have a phishing incident from someone pretending to be your bank, you should report it to

A) Your bank and CERT B) The FBI C) The local police and the FBI D) The SIIA and BSA

Computer Science & Information Technology