Which of the following hash algorithms is NOT part of the SHA-2 standard?

What will be an ideal response?


SHA-1024

Computer Science & Information Technology

You might also like to view...

The stack push operation

A) is normally implemented through a hash set B) removes and returns an item from the stack C) returns the item at the top of the stack, but does not remove it D) adds a single item to the stack

Computer Science & Information Technology

SGML can be used on ____.

A. Windows B. Linux C. Mac OS X D. all the above

Computer Science & Information Technology

Which of the following is true of the CardBus form factor?

A. designed primarily for use in PDA devices B. was used as a storage medium for digital cameras C. has a bus mastering feature D. has a 16-bit bus

Computer Science & Information Technology

A tabbed list can be converted to a Table by using the ________ button

A) Table B) Format C) List D) Edit

Computer Science & Information Technology