The security manager must store a copy of a sensitive document and needs to verify at a later point that the document has not been altered. Which of the following will accomplish the security manager's objective?

A. RSA
B. AES
C. MD5
D. SHA


Answer: C. MD5

Computer Science & Information Technology

You might also like to view...

____ view shows the document on a mock sheet of paper in the document window.

A. Print Layout B. Navigation C. Web D. Options

Computer Science & Information Technology

This code displays text in integer1JTextField, double1JTextField, and integer2JTextField. What is displayed in these JTextFields?

``` 1 private void pickRandomNumbers() 2 { 3 Random randomObject = new Random(); 4 5 int number1 = randomObject.nextInt(); 6 double number = 5 * randomObject.nextDouble(); 7 int number2 = 1 + randomObject.nextInt( 11 ); 8 integer1JTextField.setText = String.valueOf( number1 ); 9 double1JTextField.setText = String.valueOf( number ); 10 integer2JTextField.setText = String.valueOf( number2 ); 11 12 } // end method pickRandomNumbers ```

Computer Science & Information Technology

Fast Ethernet adopted the point-to-point and the ____________________ network topology with a switch or hub as a central node of the network.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Certifications are designed to recognize  ____________________ in their respective fields.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology