SHA-1 produces a hash value of __________ bits.

A. 256 B. 160

C. 384 D. 180


B. 160

Computer Science & Information Technology

You might also like to view...

To add a visual hierarchical structure to the items in a list use:

A) a theme. B) default style. C) a quick style. D) a multilevel list.

Computer Science & Information Technology

What is the maximum number of hosts you may have on a network if the first decimal value of the IP address is between 192 and 223 and the subnet mask is/24?

A. 16.7 million B. 65,546 C. 254 D. 64

Computer Science & Information Technology

The term "_____" generally refers to systems that divide processing between one or more networked clients and a central server.

A. fat client B. glueware C. client/server D. mission-critical

Computer Science & Information Technology

The numbering system in which the only integers are a 0 or a 1, is known as the ________ system.

What will be an ideal response?

Computer Science & Information Technology