1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Semmy [17]
3 years ago
13

A hacker is trying to gain remote access to a company computer by trying brute force password attacks using a few common passwor

ds in conjunction with multiple usernames. what specific type of password attack is the hacker most likely performing?
Computers and Technology
1 answer:
Arlecino [84]3 years ago
4 0
Maybe A Birthday password some times befor the hacker hacks a company computer they get the worker information so if they get your information they could see your passwords and try to do that because if the workers all share the same password becsuse the company computer so they need the same password the hacker could just use that password because the owner/boss is most likely gonna use the same password that’s a 80% chance
You might be interested in
Question #8
White raven [17]

Answer:

The other person is correct the answer is 7

Explanation:

I got it right on edge

3 0
3 years ago
Carla needs to list the role for each consultant. Those with four or more years of 26 15 experience take the Lead role. Otherwis
saveliy_v [14]

Answer :

The output is attached below

Explanation:

The following formula needs to be entered into cell N5:

=IF($M5>=4,"Lead","Associate")

4 0
3 years ago
What is a software that allows the user to modify and redistribute?
lara31 [8.8K]
A software that does and allows this is free software
8 0
4 years ago
CHALLENGE
Lorico [155]

Answer:

Following are the program to this question:

#include <stdio.h>//using the header file

int main()//main method

{

int y;//defining integer variable y

printf("Enter year value:");//print message

scanf("%d", &y);//use input method for input year value

if (y>= 2101)//defining if block that checks year greater then 2101

   printf("Distant future");//print message

else if (y>= 2001)//defining else if block that checks year greater then 2001

   printf("21st century"); //print message

else if (y>= 1901)//defining else if block that checks year greater then 1901

   printf("20th century");//print message

else  //defining else block

   printf("Long ago");//print message

   return 0;

}

Output:

Enter year value:1998

20th century

Explanation:

In the given C language code, inside the main method, an integer variable "y" is defined, which allows the user to input the year value, and use the multiple conditions to check the given value and print message when the condition is matched.  

  • Inside the "if" condition block, it checks the "y" variable value is greater and equal to 2101. so, it will print "Distant future", otherwise go to the next condition.
  • In this, if "y" value is greater than equal to "2001", it will print the message "21st century", otherwise go to the next condition.  
  • In this, If the value of "y" is greater than equal to "1901", it will print the message "20th century", and if all the above condition is not true, then it will go to the else block, and it will print "Long ago" as the message.
6 0
4 years ago
Which of the following does not reflect the second step of effective communication?
Ilya [14]

Answer:

c

Explanation:

3 0
3 years ago
Read 2 more answers
Other questions:
  • A _____ is a form of Web conferencing that uses streaming media technologies to broadcast video and/or audio over the Internet f
    15·2 answers
  • Because so many newspapers now have online versions of their publications, many observers feel that "circulation" is an insuffic
    11·1 answer
  • When using an online media source, students should ensure the information is
    13·2 answers
  • PHOTOSHOP QUESTION:
    14·1 answer
  • 3. By default, Blender® remembers your last 32 actions and allows you to undo them one at a time by pressing CTRL+Z. (1 point)
    9·1 answer
  • Which statement best describes the refraction of light
    9·1 answer
  • g How safe is to have a LinkedIn account where you have published all the important information about yourself
    13·2 answers
  • Draw algorithm and flowchart of multiply A and B​
    10·1 answer
  • What are the advantages of using ICT jn our society?​
    8·2 answers
  • a) consider the binary number 11010010. what is the base-4 representation of (11010010)2? (there is a way to do this without con
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!