The MD5 message-digest algorithm is used to ________.
A. Hash a disk to verify that a disk is not altered when you examine it
B. Wipe magnetic media before recycling it
C. Make directories on an evidence disk
D. View graphics files on an evidence drive
Answer: A. Hash a disk to verify that a disk is not altered when you examine it
Computer Science & Information Technology
You might also like to view...
An advantage of adding a field in ________ is that you name the field and set the data type when you insert the field
A) Table view B) Design view C) Datasheet view D) PivotTable view
Computer Science & Information Technology
LINQ to Objects works with objects that implement the __________ interface, which enables a program to iterate over a collection of data.
a) ICountable b) IEnumerable c) IRepeatable d) ICompare
Computer Science & Information Technology