FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
In computer terms, what is a hash?
A
A delicious way to cook potatoes
B
An encrypted value
C
A decryption key
D
None of the above
Explanation: 

Detailed explanation-1: -Hashing is the process of transforming any given key or a string of characters into another value. This is usually represented by a shorter, fixed-length value or key that represents and makes it easier to find or employ the original string. The most popular use for hashing is the implementation of hash tables.

Detailed explanation-2: -Hashing. Definition. A two-way function that takes in plaintext data, and turns it into undecipherable ciphertext. A one-way method of hiding sensitive data. Using a hashing algorithm, hashing turns a plaintext into a unique hash digest that cannot be reverted to the original plaintext, without considerable effort.

Detailed explanation-3: -Hash values can be thought of as fingerprints for files. The contents of a file are processed through a cryptographic algorithm, and a unique numerical value – the hash value-is produced that identifies the contents of the file.

Detailed explanation-4: -Hashing and Encryption have different functions. Encryption includes encryption and decryption process while hashing is a one-way process that changes data into the message digest which is irreversible.

Detailed explanation-5: -The short answer is NO: you will not obtain identical ciphertexts from the same file encrypted using two different runs of a decent public key file-encryption software; their hash will not coincide. The longer answer (in theory):

There is 1 question to complete.