1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
omeli [17]
2 years ago
15

Suppose a computer's login mechanism first asks for a user name, and then for the password, regardless of whether or not the log

in name is that of a valid user. Herman the Hacker has a list of 10,000 commonly used login names, and a list of 100,000 commonly used passwords. On this computer, there are 100 accounts that have both a login name on the first list and a password on the second list. For simplicity, assume that no other accounts have either a login name or password on these lists.
Herman has written code that can attempt 1000 logins per second on this computer. This program repeatedly chooses a random login name from the first list and a random password from the second list. Compute the expected number of seconds it will take Herman to break into some account on the machine, and identify that number from the list below.
Hint: Since names and passwords are chosen randomly, repetitions are possible. It may indeed be easier to forget what names/passwords have been tried than to keep a list of what has been tried and avoid duplicate attempts. As a result, there is an easy formula for the expected number of tries. If the probability of success on any given try is p, then the expected number of tries until the first success is exactly 1/p.
A. 1.1
B. 100.1
C. 10,000
D. 1000.1
Computers and Technology
2 answers:
Nataliya [291]2 years ago
6 0

The expected number of seconds it will take Herman to break into  (or hack) some account on the machine is 1.1 seconds. (Option A) See the explanation below.

<h3>What does it mean to hack a machine?</h3>

The act of subverting digital systems and networks by gaining unauthorized access to a computer system or account is a popular definition of hacking.

Although hacking is not always harmful, it is most frequently linked to online crime and data theft by cybercriminals.

<h3>What is the explanation for the above answer?</h3>

With 10,000 login names available, we can assume that 100 of them are accurate, as the question suggests.

The likelihood of receiving the proper login name is therefore

P 1 = 100 10,000

P1 = 0.01

In the same vein, among 100,000 password we can assume that only 100 are correct, therefore, the probability of getting the right password is.

P 2 = 100 ÷ 100,000

P2 = 0.001

That that where the probability of success on any given try is p, then the expected number of tries until the first success is exactly 1 ÷ P.

Therefore, the expected number of trials before the first successful login name is = 1÷ P1​​​​​1

= 1 ÷ 0.01

= 100

The above also works for the password:
1÷ P2

= 1 ÷ 0.001

=1000

Therefore, it will take 100+ 1000 = 1100 attempts to finally get the initial login name and password.

Given that Henrietta created programming that allows this computer to try 1000 logins every second.

Therefore, 1100 x 1000 sec = 1.1 sec is the anticipated time it will take Henrietta to gain access to a machine account.

Learn more about hacking at;
brainly.com/question/24956493
#SPJ1

OLEGan [10]2 years ago
4 0

The  expected number of seconds that will take to Herman to break into some account on the machine is 10.000. So Letter C.

Firstly, the probability of finding a correct login name (100) out of first list (1000) = 100/1000 = 1/100.

Second, After finding a login name, exactly one password will correspond to the found login name. As both the events are independent, hence:

Probability(p) = 1/100 x 1/100000 = 1/10000000.

Therefore, expected numbers of tries = 1/p = 10000000.

The code can attempt 1000 tries per second. So the expected numbers os seconds that will take to Herman break into some account will be:

10000000/1000 = 10.000.

See more about probability at: brainly.com/question/16259980

#SPJ1

You might be interested in
A(n ________ is information that is passed to a function, and a(n ________ is information that is received by a function.
pantera1 [17]

Information passed to a function: Argument.

Information received by a function: Parameter.


5 0
3 years ago
Need answer ASAP!!!!
Lyrx [107]

Hi,

I tried answering this. Lol. Look at the image.

5 0
3 years ago
Refer to the exhibit. A company is deploying an IPv6 addressing scheme for its network. The company design document indicates th
tangare [24]

Answer:

Maximum number of subsets that can be achieved per sub-site is 16.

Explanation:

IPV6 is the most latest internet protocol.Following is an example of IPV6 ip address

2001:cdba:0000:0000:0000:0000::/64

In IPV6 all zeros can be omitted or can be replaced with a single zero.

So we can write it as

2001:cdba:0000::/64

First zero in here represent site

2nd and third zero represent subsite.

4th zero represent subnet.

0 here is representation of subnet  which is a hexadecimal value.

A single hexadecimal value can have following 16 values

0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F

8 0
3 years ago
Which of the following statement about device formatting is FALSE?
notsponge [240]

Answer:

The correct option is;

A) Device manufacturers store the initial file-system data structures in the device.

Explanation:

Before a storage device can be used for data storage, it is required to prepare the device for use and to make the device to become visible to the operating system by formatting of the device

New storage devices are not pre-formatted or come with a ready to use file system as there are different file systems specifically designed for particular  operating systems or operating environment.

Formatting creates partitions, makes the hard drive visible to the operating system and creates a file system that is new such that the storage device can be used for storing files.

4 0
3 years ago
In both direct flooding attacks and _____ the use of spoofed source addresses results in response packets being scattered across
Natali5045456 [20]

Answer:

SYN spoofing attacks.    

Explanation:

The Spoofing attack is used to access the personal information it is distributed the  viruses through infected links or file .The spoofing attacks has redistributed the traffic and the flow control in the denial-of-service attacks.

The SYN spoofing attacks is used the spoofed source in the result of giving response to packet The Spoofing attack  is distributed  across the Internet also it is detectable

6 0
3 years ago
Other questions:
  • What does microsoft recommend for large organizations requiring desktop virtualization for many clients? quizlewt?
    10·1 answer
  • What device acts like a wireless base station in a network, acting as a bridge between wireless and wired networks?
    11·1 answer
  • Consider the following two implementations of the same algorithm, each written in a different language.
    11·1 answer
  • Our readings so far explored computer hardware and software, in particular operating systems and application software. There are
    11·1 answer
  • Graphic design has as its goal the communication of some __________ message to a group of people.
    6·1 answer
  • Actors,narratirs,and other people whi appear in video programs collectively called what?
    15·1 answer
  • Which of the following would not be considered a polymer?
    14·2 answers
  • Which of the following is not a form of technology?
    15·2 answers
  • What is the meaning of compiler​
    14·1 answer
  • When a derived class method has the same name as a base class method, it is often said that the derived class method ________ th
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!