Invitation to Computer Science 8th Edition

Published by Cengage Learning
ISBN 10: 1337561916
ISBN 13: 978-1-33756-191-4

Chapter 8 - 8.2 - Threats and Defenses - Practice Problems - Page 401: 4

Answer

\begin{array}{l}{\text { The file is not legitimate. Using the hash function described, the final }} \\ {\text { step is to change each digit back to a letter. The maximum digit is } 9,} \\ {\text { which would correspond to } i, \text { so no letters beyond } i \text { can appear in an }} \\ {\text { encrypted password. }}\end{array}

Work Step by Step

\begin{array}{l}{\text { The file is not legitimate. Using the hash function described, the final }} \\ {\text { step is to change each digit back to a letter. The maximum digit is } 9,} \\ {\text { which would correspond to } i, \text { so no letters beyond } i \text { can appear in an }} \\ {\text { encrypted password. }}\end{array}
Update this answer!

You can help us out by revising, improving and updating this answer.

Update this answer

After you claim an answer you’ll have 24 hours to send in a draft. An editor will review the submission and either publish your submission or provide feedback.