Answer:
grid computing
Explanation:
<h2><u>Fill in the blanks </u></h2>
<u>grid computing</u>  involves connecting geographically remote computers into a single network and combining the computational power of all computers on the network. It takes advantage of the the fact that most computers use their central processing units on average only 25 percent of the time, leaving 75 percent of their capacity available for other tasks. A super computer Nanotechnology A workstation Grid computing Green computing
 
        
             
        
        
        
We can import Scanner from Java.utils.Scanner to pull in text entered in the console. 
public static void main(String[] args) {
 Scanner sc = new Scanner(System.in);
 String password = "";
 do {
 System.out.print("Enter your password: ");
 password = sc.nextLine();
 if(!password.equals("pals") {
 System.out.println(\nIncorrect Password. Try again.");
 }
 } while(!password.equals("pals");
        
             
        
        
        
Answer:
Possible if hackers are not so intelligent.
Explanation:
Actually, hackers are intelligent
where they will change location code in different places every second. So end-user who is trying to trace it he or she has to use their intelligence to find the exact location of hackers.
Normally hackers will generate different location places and by using decipher it is possible to find the location codes.
Since hackers used encrypted message we need to decrypts the message and find it out and understand the decrypt and encrypt technology used by hackers.
It is possible to by using decipher to get uncovered locations