___________ is a cryptographic technique used to verify the integrity of data transmitted over a network.
- Decryption
- Encryption
- Hashing
- SSL/TLS
Hashing is used to ensure data integrity by generating a fixed-size hash value for a given input data. This hash value can be compared to verify data integrity during transmission or storage.
Loading...
Related Quiz
- In a Django project, you need to optimize database queries for improved performance. What strategies would you employ to minimize query time and enhance scalability?
- The process of breaking down a large table into smaller tables and defining relationships between them is known as ___________.
- In a team project, there's a debate between using React and Angular for the frontend. How would you evaluate the project requirements to determine the most suitable framework?
- In a binary search tree (BST), what is the property that ensures efficient search operations?
- What is the key difference between React and Angular in terms of data binding?