In 2005, NIST announced the intention to phase out approval of _______ and move to a reliance on the other SHA versions by 2010.

A. SHA-1 B. SHA-512

C. SHA-256 D. SHA-2


A. SHA-1

Computer Science & Information Technology

You might also like to view...

Some incoming email servers use the ____ communications protocol.

A. POP3 B. DNS C. ISP D. SMTP

Computer Science & Information Technology

In a recursive program, the number of times a method calls itself is known as the __________.

a. call count b. cyclic identity c. method heap d. depth of recursion

Computer Science & Information Technology

What is the most common character used to simulate a space?

A) underscore (_) B) asterisk (*) C) dash (-) D) plus sign (+)

Computer Science & Information Technology

Case Based Critical ThinkingCase 1You have created a very long web page. Answer the following questions about the navigation structure for this web page. Which of the following do you include if you want your users to see a road map of the website that contains your web page.

A. An image map B. A site map C. A search tool D. A hotspot

Computer Science & Information Technology