Which of the following is an example of a hash algorithm?

A) SHA
B) AES
C) RSA
D) DES


A) SHA

Computer Science & Information Technology

You might also like to view...

The _________________________ is the location of files that have been deleted.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What does the Contiguous option do when you are using the Magic Wand tool?

What will be an ideal response?

Computer Science & Information Technology

What is a digital signature?

What will be an ideal response?

Computer Science & Information Technology

Layout resources are stored as ____________________ code in the res/layout resource directory.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology