1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
omeli [17]
2 years ago
15

Suppose a computer's login mechanism first asks for a user name, and then for the password, regardless of whether or not the log

in name is that of a valid user. Herman the Hacker has a list of 10,000 commonly used login names, and a list of 100,000 commonly used passwords. On this computer, there are 100 accounts that have both a login name on the first list and a password on the second list. For simplicity, assume that no other accounts have either a login name or password on these lists.
Herman has written code that can attempt 1000 logins per second on this computer. This program repeatedly chooses a random login name from the first list and a random password from the second list. Compute the expected number of seconds it will take Herman to break into some account on the machine, and identify that number from the list below.
Hint: Since names and passwords are chosen randomly, repetitions are possible. It may indeed be easier to forget what names/passwords have been tried than to keep a list of what has been tried and avoid duplicate attempts. As a result, there is an easy formula for the expected number of tries. If the probability of success on any given try is p, then the expected number of tries until the first success is exactly 1/p.
A. 1.1
B. 100.1
C. 10,000
D. 1000.1
Computers and Technology
2 answers:
Nataliya [291]2 years ago
6 0

The expected number of seconds it will take Herman to break into  (or hack) some account on the machine is 1.1 seconds. (Option A) See the explanation below.

<h3>What does it mean to hack a machine?</h3>

The act of subverting digital systems and networks by gaining unauthorized access to a computer system or account is a popular definition of hacking.

Although hacking is not always harmful, it is most frequently linked to online crime and data theft by cybercriminals.

<h3>What is the explanation for the above answer?</h3>

With 10,000 login names available, we can assume that 100 of them are accurate, as the question suggests.

The likelihood of receiving the proper login name is therefore

P 1 = 100 10,000

P1 = 0.01

In the same vein, among 100,000 password we can assume that only 100 are correct, therefore, the probability of getting the right password is.

P 2 = 100 ÷ 100,000

P2 = 0.001

That that where the probability of success on any given try is p, then the expected number of tries until the first success is exactly 1 ÷ P.

Therefore, the expected number of trials before the first successful login name is = 1÷ P1​​​​​1

= 1 ÷ 0.01

= 100

The above also works for the password:
1÷ P2

= 1 ÷ 0.001

=1000

Therefore, it will take 100+ 1000 = 1100 attempts to finally get the initial login name and password.

Given that Henrietta created programming that allows this computer to try 1000 logins every second.

Therefore, 1100 x 1000 sec = 1.1 sec is the anticipated time it will take Henrietta to gain access to a machine account.

Learn more about hacking at;
brainly.com/question/24956493
#SPJ1

OLEGan [10]2 years ago
4 0

The  expected number of seconds that will take to Herman to break into some account on the machine is 10.000. So Letter C.

Firstly, the probability of finding a correct login name (100) out of first list (1000) = 100/1000 = 1/100.

Second, After finding a login name, exactly one password will correspond to the found login name. As both the events are independent, hence:

Probability(p) = 1/100 x 1/100000 = 1/10000000.

Therefore, expected numbers of tries = 1/p = 10000000.

The code can attempt 1000 tries per second. So the expected numbers os seconds that will take to Herman break into some account will be:

10000000/1000 = 10.000.

See more about probability at: brainly.com/question/16259980

#SPJ1

You might be interested in
Computer-based networks that trigger actions by sensing changes in the real or digital world are known as: global marketing plat
Gennadij [26K]
It known as the smart systems

It make decision by describing and analyzing the available data in a predictive or adaptive manner thereby performing an efficient and smart actions based on that analysis

A lot of smart systems evolved from micro systems
8 0
3 years ago
To navigate through your presentation slides, which key on your keyboard can you use?<br> Dankonace
jekas [21]

Answer:

You use your arrow keys

Explanation:

4 0
3 years ago
Which of the following statements is false?
mart [117]

Answer:

3 is true others are false

3 0
3 years ago
Read 2 more answers
What do you understand by multitasking?Explain cooperativemultitasking ?
Nadusha1986 [10]

Answer: Multitasking is the ability of the operating system by which a processor is able to process multiple task at the same time.

Cooperative multitasking is non preemptive multitasking where the processor is assigned to a single process and does not preempt  until it completes its jobs or moves to a waiting state.

Explanation:

In Multitasking jobs are executed at a faster rate than as many jobs or tasks can be assigned to the processor at the same time.

In cooperative multitasking due to the non preemptive nature a single job could be assigned to the cpu at a time.  

4 0
4 years ago
Read 2 more answers
Can you please help me?
DochEvi [55]

Answer:

  1. Pre-edited footage, usually direct from the camera.
  2. Process or result of selectively sequencing video and/or audio clips into a new video file.
4 0
3 years ago
Other questions:
  • An ___ is any person who spends times using technology at home
    10·1 answer
  • (It science question)
    9·1 answer
  • How does Frankenstein feel about his creation?
    15·1 answer
  • In programming, what is a string?
    8·2 answers
  • You are the leader of a team at work. What type of leader would you like to be – one that gets involved and works with the team
    15·2 answers
  • What does Putting a word in quotation marks on your search bar do on google?
    12·1 answer
  • Microsoft's ____ is one of the major web-based development environments.
    12·1 answer
  • What is the purpose of this parallelogram shape in a flowchart? O decision process o input or output start or end​
    13·1 answer
  • How do I modify objects in power point 2016 for an assignment
    11·1 answer
  • - A blacksmith is shoeing a miser's horse. The blacksmith charges ten dollars for his work. The miser refuses to pay. "Very well
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!