Question
a.
It creates a small flexible block of data
b.
It creates a small,fixed block of data
c.
It creates a encrypted block of data
d.
none of the mentioned
Posted under Operating System
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. What is a Hash Function ?
Similar Questions
Discover Related MCQs
Q. MD5 produces __ bits hash data.
View solution
Q. SHA-1 produces __ bit of hash.
View solution
Q. Which two of the following are authentication algorithms ?
View solution
Q. What is role of Key Distribution Center ?
View solution
Q. In domain structure what is Access-right equal to ?
View solution
Q. What is meaning of right-set ?
View solution
Q. What is Domain ?
View solution
Q. What does access matrix represent ?
View solution
Q. What are the three additional operations to change the contents of the access-matrix ?
View solution
Q. Who can add new rights and remove some rights ?
View solution
Q. What are the three copy rights ?
View solution
Q. Which two rights allow a process to change the entries in a column ?
View solution
Q. Which is an unsolvable problem in access-matrix ?
View solution
Q. Which of the following objects require protection ?
View solution
Q. What is ‘separation’ in security of Operating systems ?
View solution
Q. Which of the following statements are correct?
i) Physical separation – in which process use different physical objects like separate printers
ii) Physical separation – in which process having different security requirement at different times
iii) Logical separation – In which users operate under illusion that no other processes exist
iv) Logical sepration – In which processes conceal their data and computations
View solution
Q. Which of the following statements are correct?
i) Physical separation – in which process use different physical objects like separate printers
ii) Temporal separation – in which process having different security requirement at different times
iii) Physical separation – In which users operate under illusion that no other processes exist
iv) Temporal sepration – In which processes conceal their data and computations
View solution
Q. Which of the following statements are correct?
i) logical separation – in which process use different physical objects like separate printers
ii) cryptographic separation – in which process having different security requirement at different times
iii) Logical separation – In which users operate under illusion that no other processes exist
iv) cryptographic sepration – In which processes conceal their data and computations
View solution
Q. What are various roles of protection ?
View solution
Q. Which of the following objects require protection ?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Operating System? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!