1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ne4ueva [31]
2 years ago
6

_________ is the method used by password crackers who work with pre-calculated hashes of all passwords possible within a certain

character space.
Computers and Technology
1 answer:
sergij07 [2.7K]2 years ago
5 0

Answer:

DOS, Denail of Service Attacks

Explanation:

You might be interested in
Plsss help anyone PLSSSSS ​
Katena32 [7]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

This question is about to write HTML code for the given sub-questions. In each sub-question different scenario is given. So, the answer to these questions is given below in the order they asked.

1. In this question it is asked to write a code of 5 students' name in a paragraph with a different color that make them unique.

<html>

<body>

<p style="color:red;">Student A</p>

<p style="color:blue;">Student B</p>

<p style="color:black;">Student C</p>

<p style="color:orange;">Student D</p>

<p style="color:green;">Student E</p>

</body>

</html>

2. In it, the below is given code show an ordered list of subjects that you're offering.

<html>

<body>

<h2>An ordered HTML list</h2>

<ol>

 <li>Introduction to Computing</li>

 <li>Communication Skills</li>

 <li>Software Designing</li>

</ol>  

</body>

</html>

3. The below-given HTML code shows the unordered list of parts that make up the computer.  

<html>

<body>

<h2>An unordered HTML list</h2>

<ul>

 <li>CPU</li>

 <li>RAM</li>

 <li>Motherboard</li>

 <li>Mouse</li>

 <li>Keyboard</li>

 <li>Monitor</li>

</ul>  

</body>

</html>

3 0
3 years ago
What is that tool that makes liquid metal? It is used for wires, Ik I might sound dumb but I'm rlly curious​
Alex_Xolod [135]

Answer:

A blow torch?

Explanation:

4 0
3 years ago
A spreadsheet is an example of a(n):
zhenek [66]

Answer:

general-purpose application

Explanation:

General purpose application

1. These are software applications which can be used for multiple purposes.

2. These applications perform various tasks as per the need of the user. These tasks can vary in complexity and may or may not be related to each other.

3. These applications are useful for almost all categories of users.

Example include spreadsheets which is a primary application for accounting purpose. It can also be used for to store numerical data or other data in an organized format.

Another use of spreadsheets is visible in data analysis. Graphs and charts can be created based on the given numerical data stored in the spreadsheet. This helps in business growth.

Microsoft Excel and Apple Numbers are spreadsheet applications.

Another example is a word application that can be used to prepare document, reports, and flyers also. Microsoft word is a word processor.

Specialized program

1. These are software applications which can be used for special purpose only.

2. These applications can perform only the task for which it is created.

Examples include windows media player. This application can only run media (audio or video) programs.

System application

1. These include operating system and utility applications.

2. The operating system acts as an interface between the user and the hardware resources of the computer.

For example, Windows is an operating system. It is available in various versions.

3. The computer system and its resources, both software and hardware, are maintained and optimized using utility applications.

Anti-virus is an example of utility applications. It protects the computer resources from virus.

Utility applications

4. The computer system and its resources, both software and hardware, are maintained and optimized using utility applications.

5. These applications are mandatory to smooth functioning of a computer.

For example, disk driver, file manager and back up applications help in managing disks and aid in taking back ups and file management is done by file manager

8 0
3 years ago
The mechanism for preventing traffic that is perceived to be dangerous to the network is known as a a0.
nikklg [1K]
I would go with firewall
6 0
3 years ago
Where is 5G being used and how fast is it?​
soldi70 [24.7K]

Answer:

5G is being used currently in the U.S. It is definetly faster than 4G even proven when I did a speed test. It also works in more places in addition to being faster.

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • ____ are not associated with data from the database and are used to display such things as the report's title
    15·1 answer
  • What is a propriety database
    10·1 answer
  • If a full disk encryption (FDE) password is forgotten, what can be incorporated to securely store the encryption key to unlock t
    13·1 answer
  • What are the three parts of a Function
    12·1 answer
  • What is institutional advertising focused on promoting?
    8·1 answer
  • Describe the uses of computer in different fileds? please help me ​
    14·1 answer
  • Which option is used in Access to locate and retrieve data that may be present in multiple database tables within the database?
    10·2 answers
  • Which of these is true about moores law
    6·1 answer
  • What (if any) are the same feature requirements that might be found in server software/OS environments
    10·1 answer
  • From the introductory conversation chip and anna shared, which elements mentioned might suggest the use of case tools?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!