1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Stolb23 [73]
3 years ago
12

________ is a password-cracking method wherein the attacker compares passwords to lists of common words.

Computers and Technology
1 answer:
Dmitriy789 [7]3 years ago
7 0
Hi!

When someone repeatedly compares passwords to lists of common words, this is known as the dictionary attack.

We call it this because they are <em>literally </em>using a dictionary to attack you!

Hopefully, this helps! =)
You might be interested in
Suppose you find a magic $1.00 coin. Its magic power is as follows: as each day passes, you get an additional dollar plus half o
AfilCa [17]

Answer:

See explaination

Explanation:

public class QuickRich {

static void getRichQuick() {

double amount = 1;

int day = 1;

System.out.println("Day 1: $1");

while (amount < 1000000) {

day++;

if(amount + 1 + (amount/2) < 1000000)

System.out.printf("Day %d: $%.2f + ($1 + %.2f) = $%.2f\n", day, amount, amount/2, amount+(amount/2)+1);

else

System.out.printf("Day %d: $%.2f + ($1 + %.2f) >= $1000000\n", day, amount, amount/2);

amount += (1 + (amount/2));

}

}

public static void main(String[] args) {

getRichQuick();

}

}

7 0
4 years ago
Self-disclosure is most likely to occur _____________.a.
Feliz [49]

The answer is..

C.  During one-on-one conversations

4 0
3 years ago
Read 2 more answers
While traveling in India, Sabina notes all of her daily expenses in rupees in her spreadsheet. At the end of the day, she wants
Contact [7]
Use currency conversion dialog box select rupee to us dollar
8 0
4 years ago
The ______ layer adds a header to the packet coming from the upper layer that includes the logical addresses of the sender and r
rjkz [21]

Answer: Network layer

Explanation: Network layer the third layer of the OSI model architecture which is focused on the operation of making the logical paths for the data packets so that they can flow.

The packets carry the addresses of the sender port and the destination port which is added to the header of the packet and then the path is established accordingly so that the packet can travel.

4 0
3 years ago
Which two hardware features would a technician monitor within the bios if a computer was suspected of overheating?
Firdavs [7]
I would say probably the CPU Fan and the CPU clock speed 
4 0
3 years ago
Other questions:
  • The support group at Universal Containers wants agents to capture different information for product support and inquiry cases. I
    14·1 answer
  • hi Let's say you graduate from school and you are unemployed or take a low-paying job. What are your debt repayment options if y
    8·2 answers
  • 10 points!
    12·1 answer
  • What is the advantage of processor affinity on SMP computers ?
    14·1 answer
  • Functions are ideal for use in menu-driven programs. When a user selects a menu item, the program can_______ the appropriate
    5·1 answer
  • Treat others the way
    5·2 answers
  • How do you get a potion of fire-protection in the overworld because I am having a hard time in the Nether? I will give away 14 p
    8·2 answers
  • The physical parts of a computer are called application software.
    9·2 answers
  • Which layer of the iOS architecture is responsible for text and typography?
    14·2 answers
  • Which of the following is one of the tools used by a Python IDE that helps prevent syntax errors?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!