answersLogoWhite

0

To achieve data security and integrity.

User Avatar

Wiki User

16y ago

What else can I help you with?

Related Questions

Which encryption technology uses the SHA and MD5 algorithms?

Hash Encoding


Which two algorithms are used for hash encoding to guarantee the integrity of data?

MD5 and SHA


Which two algorithm are used for hash encoding to guarantee the ingerity of data?

MD5 and SHA


What is a hash function?

hash function is technique used in message authentication it is attached to the message for security purpose


What is the full form of Hash?

Hash is a digit uses as a letter,on the other hand Hash is a web related format.you can stand it for some purpose. HASH HEAD AND SHOULDERS HOME AND SCHOOL HONESTY


What are some creative recipes that can be made using frozen hash brown patties?

Some creative recipes using frozen hash brown patties include hash brown waffles, hash brown breakfast casserole, and hash brown egg cups.


What is data gathered using the senses?

encoding


How does a proxy avoidance site work?

A site used to get around a firewall at work or school works by encoding the URL into a hash. This hash is read by the firewall as a random string of letters and numbers, so it is not caught by a filter looking for "Youtube", "Myspace", or "Movies".


What is an example sentence using the word encoding?

Dysgraphia is a problem of encoding language not decoding language like dyslexia.


How can I make hash brown patties using frozen hash browns?

To make hash brown patties using frozen hash browns, first thaw the hash browns. Then mix them with seasonings like salt, pepper, and onion powder. Shape the mixture into patties and cook them in a skillet with oil until they are crispy and golden brown on both sides.


What is the purpose of run-length encoding?

It's a very simple method of compressing data.


What is double hashing in data structure?

if collision is occurred in hash function then we can solve this problem by using double hash function