1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
omeli [17]
2 years ago
15

Suppose a computer's login mechanism first asks for a user name, and then for the password, regardless of whether or not the log

in name is that of a valid user. Herman the Hacker has a list of 10,000 commonly used login names, and a list of 100,000 commonly used passwords. On this computer, there are 100 accounts that have both a login name on the first list and a password on the second list. For simplicity, assume that no other accounts have either a login name or password on these lists.
Herman has written code that can attempt 1000 logins per second on this computer. This program repeatedly chooses a random login name from the first list and a random password from the second list. Compute the expected number of seconds it will take Herman to break into some account on the machine, and identify that number from the list below.
Hint: Since names and passwords are chosen randomly, repetitions are possible. It may indeed be easier to forget what names/passwords have been tried than to keep a list of what has been tried and avoid duplicate attempts. As a result, there is an easy formula for the expected number of tries. If the probability of success on any given try is p, then the expected number of tries until the first success is exactly 1/p.
A. 1.1
B. 100.1
C. 10,000
D. 1000.1
Computers and Technology
2 answers:
Nataliya [291]2 years ago
6 0

The expected number of seconds it will take Herman to break into  (or hack) some account on the machine is 1.1 seconds. (Option A) See the explanation below.

<h3>What does it mean to hack a machine?</h3>

The act of subverting digital systems and networks by gaining unauthorized access to a computer system or account is a popular definition of hacking.

Although hacking is not always harmful, it is most frequently linked to online crime and data theft by cybercriminals.

<h3>What is the explanation for the above answer?</h3>

With 10,000 login names available, we can assume that 100 of them are accurate, as the question suggests.

The likelihood of receiving the proper login name is therefore

P 1 = 100 10,000

P1 = 0.01

In the same vein, among 100,000 password we can assume that only 100 are correct, therefore, the probability of getting the right password is.

P 2 = 100 ÷ 100,000

P2 = 0.001

That that where the probability of success on any given try is p, then the expected number of tries until the first success is exactly 1 ÷ P.

Therefore, the expected number of trials before the first successful login name is = 1÷ P1​​​​​1

= 1 ÷ 0.01

= 100

The above also works for the password:
1÷ P2

= 1 ÷ 0.001

=1000

Therefore, it will take 100+ 1000 = 1100 attempts to finally get the initial login name and password.

Given that Henrietta created programming that allows this computer to try 1000 logins every second.

Therefore, 1100 x 1000 sec = 1.1 sec is the anticipated time it will take Henrietta to gain access to a machine account.

Learn more about hacking at;
brainly.com/question/24956493
#SPJ1

OLEGan [10]2 years ago
4 0

The  expected number of seconds that will take to Herman to break into some account on the machine is 10.000. So Letter C.

Firstly, the probability of finding a correct login name (100) out of first list (1000) = 100/1000 = 1/100.

Second, After finding a login name, exactly one password will correspond to the found login name. As both the events are independent, hence:

Probability(p) = 1/100 x 1/100000 = 1/10000000.

Therefore, expected numbers of tries = 1/p = 10000000.

The code can attempt 1000 tries per second. So the expected numbers os seconds that will take to Herman break into some account will be:

10000000/1000 = 10.000.

See more about probability at: brainly.com/question/16259980

#SPJ1

You might be interested in
True or false? Software application packages function as the interface between the operating system and firmware.
olga2289 [7]

Answer:

h

Explanation:

8 0
4 years ago
which quotation from the story of the fisherman in the Arabian nights' entertainments supports the theme that cleverness trumps
Greeley [361]

Answer:

Vexed with having such a bad haul, when he had mended his nets, which the carcass of the butt had broken in several places, he threw them a second time

Explanation:

SORRY IF WRONG JUST TRYING TO GET BRAINLIEST TO LEVEL UP

6 0
4 years ago
Which of the following statements is true of algorithms?
Agata [3.3K]

Answer:

Algorithms allow automation of complex task

Explanation:

I just did it

3 0
3 years ago
Is there a way I can put an already made sound that i created over an already made video
lys-0071 [83]
If you're using an apple product to do video editing, then iMovie is probably the best way to do that.

If you're on Windows and you're looking for a free video editing website, I'd suggest WeVideo. Although WeVideo does add watermarks to your videos, editing is pretty easy when using it.
6 0
4 years ago
Recently, a serious security breach occurred in your organization. An attacker was able to log in to the internal network and st
natulia [17]

Answer: Geotagging was enabled on her smartphone

Explanation:

The security weakness that is the most likely cause of the security breach is that geotagging was enabled on the vice president's smartphone.

Geotagging, occurs when geographical identification metadata are added to websites, photograph, video, etc. Geotagging can be used to get the location of particular place.

In this case, since geotagging was enabled on her smartphone, it was easy for the attacker to locate her house.

8 0
3 years ago
Other questions:
  • The strength of the electromagnetic waves being radiated from an antenna is referred to as gain, which involves a measurement of
    9·1 answer
  • PLEASE HELP!!!!!!!!!!!
    7·1 answer
  • Write a complete main method that does the following: 1. Takes any number, but at least two, command line arguments which are nu
    8·1 answer
  • Retype the statements, correcting the syntax errors.
    9·1 answer
  • Big data refers to huge collections of data that are difficult to process, analyze, and manage using conventional data tools. It
    13·1 answer
  • Is anyone a robIox moderator?
    13·2 answers
  • PLEASE HELP WILL GIVE BRAINLIEST!!!’
    15·1 answer
  • 9. These particular machines can be decentralized.
    9·1 answer
  • Need help completing this coding assignment.
    11·1 answer
  • Your worksheet contains confidential information in column C; to prevent others who use your worksheet from seeing the data, you
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!