why should you compare hashes of the files you download from the internet to a library of known hash values?

Answers

Answer 1

A hash is a unique code that is generated from a file's contents. It prevents the spread of malware by checking a file's integrity.

What is hash values ?A hash value, also known as a hash code, is a numerical value that is generated from the contents of a file or other data. Hash values are used to verify the integrity of data by allowing a recipient to compute the hash value of the received data and compare it to the expected hash value. When you download a file, you can use a tool to calculate the hash of the downloaded file and compare it to the expected hash value provided by the source of the download. If the calculated hash matches the expected hash, it means that the file has been downloaded correctly and is unchanged from its original form. If the calculated hash does not match the expected hash, it means that the file has been modified or corrupted during the download process and may not be trustworthy.

To learn more about hash values refer :

https://brainly.com/question/28325568

#SPJ4


Related Questions

"How can traditional (waterfall) and agile methods be combined
for successful management of projects?

Answers

Traditional (waterfall) and agile methods can be combined for successful project management through a hybrid approach. This approach aims to leverage the strengths of both methodologies to achieve better outcomes.

Here are some ways to combine them:
1. Project Planning: Begin with a traditional waterfall approach to establish a clear project scope, objectives, and requirements. This phase allows for thorough planning, documentation, and stakeholder engagement.
2. Iterative Development: Adopt an agile approach for the development phase. Break the project into smaller iterations or sprints, each delivering a working product increment. This allows for flexibility, continuous feedback, and faster value delivery.
3. Communication and Collaboration: Agile methods emphasize frequent communication and collaboration. Encourage cross-functional teams to work closely, exchange ideas, and share progress. This ensures effective coordination and alignment between team members.
4. Risk Management: Traditional methods typically focus on risk identification and mitigation at the beginning of the project. In a hybrid approach, continue to assess risks throughout the project using agile methods. This enables proactive risk management and adjustments as needed.
5. Change Management: Agile methods are known for accommodating change. Incorporate change management techniques, such as backlog refinement and prioritization, into the hybrid approach. This ensures the project remains adaptable to changing requirements.
6. Monitoring and Reporting: Utilize traditional methods for tracking progress against the project plan and reporting to stakeholders. At the same time, leverage agile methods to monitor team performance and adjust the project trajectory as necessary.

By combining traditional (waterfall) and agile methods, project managers can achieve a balance between structure and flexibility, resulting in more successful project outcomes.

To know more about mitigation  refer for:

https://brainly.com/question/31378085

#SPJ11

help pls I will mark brainliest the top answer i need it rn
Nonsense = REPORT
Answer the question 3-5 sentences.
"Why is recycling very important and beneficial to you and your community?"​

help pls I will mark brainliest the top answer i need it rnNonsense = REPORT Answer the question 3-5

Answers

Answer:

to reduce outbreak of diseases

Explanation:

materials recycled, funds earned from it are used developmental projects in my community

ASCII is a common format for the representation of characters in writing code. How many characters can be represented in the standard ASCII encoding

Answers

Answer:

A total of 128 characters can be represented in the standard ASCII encoding.

Explanation:

The American Standard Code for Information Interchange (ASCII) was created to make an international standard for encoding the Latin letters. In 1963, ASCII was received so data could be deciphered between PCs; speaking to lower and upper letters, numbers, images, and a few orders.

Since ASCII is encoded using ones and zeros, the base 2 number framework, it uses seven bits. Seven bits permits 2 to the power of 7 = 128 potential blends of digits to encode a character.

ASCII consequently ensured that 128 significant characters could be encoded.

Text books are not a good source for finding ideas about what to study because the teachers make up the test questions. Please select the best answer from the choices provided T F

Answers

Answer:

Text books are not a good source for finding ideas about what to study because the teachers make up the test questions. False- most teachers use the textbooks as guides. Visiting the library to seek books on your current topic will not help you in determining what to study.

Explanation:

Text books are not a good source for finding ideas about what to study because the teachers make up the test questions. False- most teachers use the textbooks as guides. Visiting the library to seek books on your current topic will not help you in determining what to study.

Answer:

False

Explanation: I took the test and passed!!

In the lesson, you learned about the various uses of computers in manufacturing, from design to the control of manufacturing processes. Write a short report about the advantages and main features of CAD. Discuss the main applications of CAM as well.

Answers

Some of the main features of Computer Aided Design:
(CAD) are:

Modeling in solids.Engineering drawings are created from solid models.Surface modeling in freeform.Assemblies are collections of pieces and/or other assemblies that are designed automatically.Design components can be reused.

Glassworking, woodturning, metallurgy and spinning, and graphical refinement of the entire production technique are some of the key uses of the Computer Aided Manufacturing (CAM) system. CAM systems are used to create solids of rotation, flat surfaces, and screw threads.

What is CAD?

The use of computers to help in the development, alteration, analysis, or optimization of a design is known as computer-aided design.

This program is used to boost the designer's efficiency, improve design quality, improve communication through documentation, and develop a database for production.

Learn more about Computer Aided Manufacturing:
https://brainly.com/question/14039774
#SPJ1

you are trying to clean up a slow windows 10 system that was recently upgraded from windows 8, and you discover that the 75 gb hard drive has only 5 gb of free space. the entire hard drive is taken up by the windows volume. what is the best way to free up some space?

Answers

The best way to free up space on a Windows 10 system with a full hard drive is to clean up unnecessary files and uninstall unnecessary programs. Unnecessary files are those files that are taking up space on your hard drive but are not important or useful.

The Windows operating system has a built-in tool called Disk Cleanup that can be used to clean up unnecessary files. To access it, type "Disk Cleanup" into the Windows search bar and open the program. Disk Cleanup will scan your hard drive for unnecessary files and give you the option to delete them. Another way to free up space is to uninstall programs that you don't use or need. To uninstall programs, go to Settings > Apps > Apps & features, and select the program you want to uninstall. Click the Uninstall button to remove the program from your system. Other things to consider to free up space are deleting large files, emptying the recycle bin, moving files to an external hard drive or cloud storage, and disabling hibernation mode.

Learn more about Windows operating system here https://brainly.com/question/1092651

#SPJ11

A. Fallacy B. Proposition C. Conditional Statement D. Assumption E. Logical Reasoning F. Variable An element of a situation that has the potential to change in value. A B C D E F An element of a situation that is accepted as true without proof. A B C D E F The process of analyzing and evaluating arguments to draw a valid conclusion. A B C D E F A statement that is either true or false. A B C D E F A statement with an if-then structure that is either true or false. A B C D E F An argument based on an error in reasoning.

Answers

Answer:

A,B

Explanation:

its in the question......,....,...

What are characteristics of fluent readers? Check all that apply. reading known words automatically pronouncing words correctly reading words as quickly as possible understanding the meanings of the words being read O looking up all unknown words in the text being read

it's A,B,D​

Answers

Answer:

D,A,B hope this is it!!!!!

Answer:

The person above me is correct

Explanation: credit to him

15 points and brainliest if correct! :D

Complete the following sentence.
______ is an essential skill in order to decipher the massive amount of new information for any job dealing with data.

Answers

Technology I think (this is so I can answer this)
Technology I think it is

which is the only set operator which eliminates duplicate values? quizzlet

Answers

Only the "UNION" operator in a set may get rid of duplicate values. By combining the output of two or more SELECT statements, the UNION operator creates a single result set that contains all the unique rows from all the combined queries.

In other words, if two or more queries return rows with the same values, the UNION operator will only include one copy of those rows in the final result set. It's crucial to remember that the UNION operator only gets rid of redundant rows contained inside the same SELECT expression. Each SQL statement will be handled separately if numerous SELECT statements are used with UNION, and duplicates may still show up amongst the various SELECT statements. The "UNION ALL" operator can be used to remove duplicate rows from numerous SELECT statements, although doing so will include all rows from each SQL statement, including duplicate rows.

learn more about UNION here:

brainly.com/question/15126489

#SPJ4

User
Application Software
Operating System
Hardware

Assignment #1
•Explain the meaning of this graphics organizer base on what you have learned from this lesson.

• Is an "app" same in meaning with "application"? ​

User Application Software Operating System HardwareAssignment #1 Explain the meaning of this graphics

Answers

This graphics organizer base talks about Software and how it is divided into two groups such as the operating systems and application software.

What are Software?

Software are said to be often shared into  two categories such as:

The operating systems The application software.

Note that the Operating systems functions by helping the hardware and produce a kind of interface between the hardware and its user while the Application software is said to be a stage of a programs that help the user to do anything meaningful just as seen in the diagram.

Conclusively, The word "app" has the in meaning with "application". It is known to be the short form of application.

Learn more about Application Software from

https://brainly.com/question/1538272

Which of the following are addressed by programing design? Choose all that apply.

Who will work on the programming
The problem being addressed
The goals of the project
The programming language that will be used

Answers

Answer:

Its B, D, and E

Explanation:

Hope this helps

Answer:

3/7

B

D

E

4/7

Just a page

5/7

B

C

6/7

Page

7/7

A

B

D

What is the output?

a = []
a.append([2, 4, 6, 8, 10])
a.append(['A', 'B' , 'C', 'D', 'E'])
a.append([111, 222, 333, 444, 555])
a.append(['roses', 'daisies', 'tulips', 'clover', 'zinnias'])
print(a [2] [4])
555
E
D
444

Answers

Note that the output of the code is: 555

What is the explanation for the above response?

The list a has four elements, each of which is a list itself. The expression a[2] accesses the third element of a, which is the list [111, 222, 333, 444, 555].

The expression a[2][4] accesses the fifth element of that list, which is 555. Therefore, the output of the code is 555.

A computer code is a set of instructions written in a specific programming language that can be executed by a computer to perform a particular task or achieve a specific goal.

Learn more about code at:

https://brainly.com/question/28848004

#SPJ1

Select the three careers in the creative side of digital media.

broadcasting
web designer
animators
filmmaker
project management

Answers

Answer:

I would pick A B and D to be my answer

Answer:

web designer, animators, and filmmaker.

What is the consequence of configuring a router with the ipv6 unicast-routing global configuration command?​

Answers

Note that the consequence of configuring a router with the IPV6 unicast-routing global configuration command is that "the IPv6 enabled router interfaces begin sending ICMPv6 Router Advertisement messages." (Option B)

What is IPV6?

The most current version of the Internet Protocol, the communications protocol that supplies an identifying and location system for computers on networks and directs data across the Internet, is Internet Protocol version 6.

Internet Protocol version 6 (IPv6) is a required component of Windows Vista, Windows Server 2008, and subsequent versions. We do not advocate turning off IPv6 or any of its components. Some Windows components may stop working as a result. Instead of blocking IPV6, it is advocated for one to utilize "Prefer IPv4 over IPv6" in prefix policies.

Learn more about routers;
https://brainly.com/question/15851772
#SPJ1

Full Question:

What is the consequence of configuring a router with the ipv6 unicast-routing global configuration command?​

All router interfaces will be automatically activated.The IPv6 enabled router interfaces begin sending ICMPv6 Router Advertisement messages.Each router interface will generate an IPv6 link-local address.​It statically creates a global unicast address on this router.​

Which of these is a biotic factor in a forest?
Will
O A. Climate
O O
O B. Terrain
O C. Trees
O D. Water​

Answers

Answer: trees

Explanation:

print 3 numbers before asking a user to input an integer

print 3 numbers before asking a user to input an integer

Answers

Answer:

you can use an array to do this

Explanation:

(I've written this in java - I think it should work out):

Scanner input = new Scanner(System.in);

System.out.println("Enter an integer: ");

int userInt = input.nextInt();

int[] array = new int[userInt - 1];

for(int i = userInt-1; i < userInt; i--)

     System.out.println(array[i]);

Which best defines what a script tag does?

Which best defines what a script tag does?

Answers

Answer:

The answer to your question would be C , A tag used to write programming scripts.

Explanation:

The  element either contains scripting statements, or it points to an external script file through the src attribute. Common uses for JavaScript are image manipulation, form validation, and dynamic changes of content. Hope this helps you! </p><p></p>

if you position the mouse pointer over the border of a column and double-click it, ____.

Answers

If you place the mouse pointer above a column's border and double-click it, the column will adapt to fit the widest entry in the column.

What happens if you press the Tab key while the insertion point is in the final cell of a table?

Use your keyboard's arrow keys or the Tab key to switch between cells. Pressing the Tab key will instantly start a new row if the insertion point is in the final cell.

What takes place when the table move handle is clicked?

The table may be moved by clicking and dragging the table move handle. On the Insert tab, there is a table button. To change the width of columns, use the AutoFit command.

To know more about mouse pointer visit:

brainly.com/question/28031890

#SPJ4

true or false? the u.s. government currently has no standard for creating cryptographic keys for classified applications

Answers

The United States government selected the symmetric block cipher known as the Advanced Encryption Standard (AES) to safeguard sensitive data. To encrypt data, AES is used in hardware and software across the globe.

What type of encryption does the US government employ?

The current encryption standard for the majority of governmental and commercial IT security applications is the Advanced Encryption System (AES). In 2001, AES was selected as the U.S. government's security standard. Over time, it has developed into the encryption standard for the majority of businesses in the private sector.

In the US, is encryption permitted?

It varies. The import, export, and use of encryption goods may be prohibited in the United States and many of the countries you travel to due to their potential use for criminal and terrorist activity.

to know more about cryptographic keys here:

brainly.com/question/14278859

#SPJ1

What is the graphic artist trying to achieve in this illustration, using contrast in color?

Answers

Answer:

Image result for What is the graphic artist trying to achieve in this illustration, using contrast in color?

Having a contrast of size adds visual interest in the composition, and will help you establish the key elements in your layout so you can be sure the viewer is focusing on the right area. Contrast of size is not applicable to just text; it can also be the images in the design.

Explanation:

Answer: the answer is emphasis

Explanation:

what is the main digestive function of the pancreas?

Answers

The main digestive function of the pancreas is the production and secretion of digestive enzymes. These enzymes play a crucial role in breaking down various components of food, such as carbohydrates, proteins, and fats, to facilitate their absorption and utilization by the body.

The pancreas produces and releases digestive enzymes into the small intestine, where the majority of the digestive process takes place. The two main types of digestive enzymes produced by the pancreas are:

1. Pancreatic amylase: This enzyme helps in the digestion of carbohydrates. It breaks down complex carbohydrates, such as starch and glycogen, into simpler sugars like glucose, which can be readily absorbed by the body.

2. Pancreatic proteases: These enzymes assist in the breakdown of proteins. The pancreas produces several proteases, including trypsinogen, chymotrypsinogen, and procarboxypeptidase. These enzymes are initially secreted in their inactive forms and are activated within the small intestine. Once activated, they break down proteins into smaller peptides and amino acids, which can be absorbed and utilized by the body.

In addition to these primary enzymes, the pancreas also produces lipases, which are responsible for the digestion of fats. Lipases break down dietary fats into fatty acids and glycerol, which can be absorbed by the intestinal lining and transported throughout the body for energy production and other functions.

Overall, the pancreas plays a vital role in the digestion and absorption of nutrients by producing and releasing digestive enzymes that help break down carbohydrates, proteins, and fats in the small intestine, enabling their utilization by the body.

Learn more about the pancreas and digestive enzymes: https://brainly.com/question/29735070

#SPJ11

All of the following are ways to avoid injuries when working on computers except Select one: O A. taking breaks O B. ensuring proper lighting O so you are looking up at it OD. purchasing an adjustable chair ? Ҷх – 2 O

Answers

The option that is not a way to avoid injuries when working on computers is ensuring proper lighting so you are looking up at it, option C is correct.

Proper lighting is important for computer work to reduce eye strain and prevent visual discomfort, but the specific condition where you are looking up at the lighting, is not a recommended practice.

In fact, it is generally advised to have the lighting positioned in a way that avoids glare on the screen and provides even illumination without causing strain on the neck or eyes.

Regular breaks help reduce eye fatigue, muscle tension, and the risk of repetitive strain injuries (RSIs).

Adequate lighting conditions in the workspace help prevent eye strain and discomfort.

An adjustable chair allows you to maintain proper posture, support your back, and adjust the height and position of your workstation to minimize strain on the body.

To learn more on Computers click:

https://brainly.com/question/32297640

#SPJ4

Can anyone please help me on these two questions it would really help xxx

Can anyone please help me on these two questions it would really help xxx

Answers

Answer: No one can interpret or hack it.

Explanation:

Because there is nothing to hack.

take it from someone who hack their teachers laptop as a dare. It was so easy.

Which of the following are NOT possible using the RANDOM(a, b) and DISPLAY(expression) abstractions?
DISPLAY(RANDOM(3,6) + RANDOM(4,5))

Answers

Ok so FYI I’m not good with devices and technology. I know how to use them, but I don’t understand how it all works like the programming and code.

Using the RANDOM(a, b) and DISPLAY(expression) abstractions, the expression DISPLAY(RANDOM(1, 4) + RANDOM(2, 5)) is not possible to evaluate to 9.

Thus, option B is correct.

Let's break it down:

RANDOM(1, 4) can generate random numbers from 1 to 4 (inclusive). RANDOM(2, 5) can generate random numbers from 2 to 5 (inclusive).

The maximum value that can be generated by RANDOM(1, 4) is 4, and the maximum value that can be generated by RANDOM(2, 5) is 5.

So, the sum of these two maximum values is 4 + 5 = 9.

Since the maximum value of the expression RANDOM(1, 4) + RANDOM(2, 5) is 9, it is not possible for the result to be greater than 9.

Thus, option B is correct.

Learn more about Abstraction here:

https://brainly.com/question/30626835

#SPJ6

Providing a great user or visitor experience begins with___
URL
Content
Design
Keywords

Answers

Providing a great user or visitor experience begins with a combination of well-designed website layout, engaging and relevant content, and strategically placed keywords to optimize search engine visibility.

Longer articles are typically broken into parts, and sections longer than a particular length are typically divided into paragraphs. These divisions make the text easier to read. Although articles should still adhere to appropriate organisational and writing standards for sections and paragraphs, the titles and placements of section headings are frequently decided by the pertinent WikiProject.

Headings introduce divisions and subsections, explain articles by dividing up language, arrange content, and fill the contents page. Short sections and subsections obstruct the flow of the writing by overcrowding the article with titles. Single phrases and brief paragraphs typically don't need their own subheadings.

learn more about  website here:

https://brainly.com/question/29777063

#SPJ11

Wiliam would like to sort a list of items after the data is already entered
Which method is NOT an available sort option?
number
date
text
symbol

Answers

Answer symbol

Explanation:

Symbol is not an available sort option.

Explain why Windows reports 8 GB of memory even though the one SO-DIMM contains 4 GB of memory.
Can the laptop receive a memory upgrade and if so, how much will it cost?

Answers

Due to the laptop's dual-channel memory arrangement, which allows it to use two SO-DIMMs simultaneously, Windows reports 8 GB of memory.

Each SO-DIMM in this instance is delivering 4 GB of memory, making a total of 8 GB available. The OS and the game are considerably more knowledgeable about how the RAM should be maintained and what assets should be moved where than you or I am.

High RAM use is in no way harmful. You don't pay for 8GB to utilize only 2GB, do you? In that case, purchase 2GB instead. Never worry about RAM utilization unless an unknown app is using too much and preventing the use of other system features or capabilities.

Learn more about memory here-

https://brainly.com/question/30273393

#SPJ4

Binary is represented by two digits, write out each and describe what each means:

Answers

Answer:

binary is represented by 1 and 0

Explanation:

the binary of 1 means it has value, and the binary of 0 means it has no value. with a combination of 1s and 0s, you can get a complex program to run, like this platform :) what it basicly does is a true or false kinda think. just think of it that way: true or false, value or no value, and yes or no. the 1 is a positive value and the 0 is a negative value that has no value.

I hope this helps you :D

In binary, the 0s and 1s signify OFF and ON, respectively.

What do the binary numbers 1 and 0 represent?

In binary, the 0s and 1s signify OFF and ON, respectively. A "0" in a transistor indicates that no electricity is flowing, while a "1" indicates that electricity is flowing.

Numbers are physically represented inside the computing equipment in this fashion, allowing calculations.

Learn more about binary numbers here:

https://brainly.com/question/13371877

#SPJ4

Write a program to find the sum of first 10 even numbers in qbasic​

Answers

Answer:

CLS. FOR I = 1 TO 10. INPUT "ENTER THE NUMBERS"; N(I) IF N(I) MOD 2 = 0 THEN S = S + N(I) ...

Other Questions
help me help .e iim crying I can't get it right solve as multi step eqaution 7(4 - t) = -84 When Southern slaveholders looked at the map, what would have caused them concern? what is the ph of a 0.235m solution of kf ka = 6.6*10^-4 A fashion designer wants to know how many new dresses women buy each year. A sample of 523 women was taken to study their purchasing habits. Construct the 95% confidence interval for the mean number of dresses purchased each year if the sample mean was found to be 7.3. Assume that the population standard deviation is 1.4. Round your answers to one decimal place. List the following gases in order of increasing average molecular velocity at 25 degrees Celcius: H20, He, HCI, BrF, and NO2 please help! lot of points 32.Passive sonar uses underwater microphones called hydrophones.TrueFalse What is the rule or threshold that needs to be met for a federal court to convict a criminal case? Beyond any doubts By preponderance of the evidence Beyond reasonable doubt Assume that rents flow clockwise in a circular economic flow diagram. This implies that land flows: Multiple Choice clockwise and profits flow counter clockwise. 0 O counter clockwise and profits flow clockwise. 0 clockwise and capital flows counter clockwise. 0 ) counter clockwise and capital flows clockwise. Aimi took out a RM200,000, 25-year mortgage with an annual interest rate of 8%. She pays RM1 800 per month for this mortgage loan. Aimi has made 15 years' worth of payments. How much does Aimi still owe on her mortgage? (4 marks) Read the sonnet.Sonnet XIIby William ShakespeareWhen I do count the clock that tells the time,And see the brave day sunk in hideous night;When I behold the violet past prime,And sable curls all silvered o'er with white;When lofty trees I see barren of leaves Which erst from heat did canopy the herd,And summer's green all girded up in sheavesBorne on the bier with white and bristly beard,Then of thy beauty do I question make,That thou among the wastes of time must go, Since sweets and beauties do themselves forsakeAnd die as fast as they see others grow; And nothing 'gainst Time's scythe can make defence Save breed, to brave him when he takes thee hence.How does the change from the rhyming pattern in the quatrains to the rhyming couplet in "Sonnet XII" affect the poem?It makes readers want to see if any other lines rhyme with the couplet.It informs readers that the last two rhyming words are the most important.It makes readers focus on the conclusion and the author's message.It causes readers to change their speaking tone when reading aloud. how many grams of pure water must be added to 40 grams of a 10% saline solution to make a saline solution tha is 5% salt? An aircraft cruises at 270 m/s at 10,000 m where atmospheric pressure is 26430 Pa, P-04 kg/m and y1.4. Calculate the Mach number the aircraft is cruising at and specily whether it is in a subsonic, transonic, or supersonic regime. What are three of the dimensions hofstede identified and studied? Can someone plssss help me with this!!!!QUESTION: Identify ONE way in which technological advancement allowed the invasions illustrated on the map (in 3 paragraphs) Why was Nick a good choice to narrate a story intended to capture the spirit of the 1920s? - The Great Gatsby 15. The sum of two numbers is 31/35, and their difference is 11/35. What are the numbers? is being flexible is an important step in meeting deadlines Find the product of 25*(-5)A. 20B. -30C. -125D. 100