Gaois

This is a static copy of data that is exported from IATE on an occasional basis. It should not be assumed that information provided about an entry here will always correspond to the current version of the entry in IATE. That current version can be checked by clicking on the link on the upper right hand side of each entry. More information »

1 result

  1. EDUCATION AND COMMUNICATIONS|communications|communications policy · EDUCATION AND COMMUNICATIONS|information technology and data processing · EDUCATION AND COMMUNICATIONS|communications|communications systems|telecommunications
    algartam haiseála Reference Faomhadh an téarma seo mar chuid de Thionscadal Lex
    ga
    Hash-Algorithmus
    de
    hash algorithm | hashing algorithm
    en
    Definition function that converts a data string into a numeric string output of fixed length Reference "Federal Agencies Digitization Guidelines Initiative, http://www.digitizationguidelines.gov/term.php?term=hashalgorithm [31.01.2018]"
    Comment Hash algorithms are designed to be collision-resistant, meaning that there is a very low probability that the same string would be created for different data. Two of the most common hash algorithms are the MD5 (Message-Digest algorithm 5) and the SHA-1 (Secure Hash Algorithm). MD5 Message Digest checksums are commonly used to validate data integrity when digital files are transferred or stored.
    algorithme de hachage
    fr
    Definition fonction mathématique qui permet la création d'une empreinte numérique en transformant un groupe de données de taille variable en un code unique de taille fixe Reference "Office québécois de la langue française > Grand dictionnaire terminologique > fiche algorithme de hachage (2.6.2023)"