The hash value is called a ____.

A. cipher
B. digest
C. ciphertext
D. plaintext


Answer: B

Computer Science & Information Technology

You might also like to view...

Java does not use late binding for methods marked as:

a. final b. static c. private d. all of the above

Computer Science & Information Technology

Match the following terms with their description

I. Primary key field A. When a record in one table is related to a single record in a second table II. Foreign key field B. A join or connection between two tables in a database III. One-to-many relationship C. When a record in one table may be related to many records in another table IV. One-to-one relationship D. Used to join with a primary key field in another table V. Relationship E. Contains unique data for each record

Computer Science & Information Technology

If the IndexOf method does not find the specified substring, it returns _________.

a) false b) 0 c) -1 d) None of the above.

Computer Science & Information Technology

The ____________________ property of a CompareValidator control on a Web form specifies the name of the object you are comparing to the control that is being validated.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology