Which of the following is used to verify data integrity?

A. SHA
B. 3DES
C. AES
D. RSA


Answer: A. SHA

Computer Science & Information Technology

You might also like to view...

The mathematician who first studied finite fields was __________ .

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

DBMS stands for ________

A) Database Marketing System B) Data Management System C) Data Marketing System D) Database Management System

Computer Science & Information Technology

If the year is not entered when typing a date into a cell, ________

A) the year 2000 will be automatically inserted B) the year 1900 will be automatically inserted C) the year will stay blank D) the current year will be inserted

Computer Science & Information Technology

___________ allows you to set how text flows around a graphic.

a. Graphic wrapping b. Text wrapping c. Image wrapping d. Paragraph wrapping

Computer Science & Information Technology