Which of the following is used to verify data integrity?
A. SHA
B. 3DES
C. AES
D. RSA
Answer: A. SHA
Computer Science & Information Technology
You might also like to view...
The mathematician who first studied finite fields was __________ .
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
DBMS stands for ________
A) Database Marketing System B) Data Management System C) Data Marketing System D) Database Management System
Computer Science & Information Technology
If the year is not entered when typing a date into a cell, ________
A) the year 2000 will be automatically inserted B) the year 1900 will be automatically inserted C) the year will stay blank D) the current year will be inserted
Computer Science & Information Technology
___________ allows you to set how text flows around a graphic.
a. Graphic wrapping b. Text wrapping c. Image wrapping d. Paragraph wrapping
Computer Science & Information Technology