1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Wewaii [24]
3 years ago
14

An attacker captures an encrypted message. he tries decrypting with every possible key until the decryption process reveals a se

nsible message. it is appropriate to call his decryption efforts a/an __________ attack.
Computers and Technology
1 answer:
strojnjashka [21]3 years ago
8 0
Brute force. He's not using any information to mathematically derive information about the key, just trying all possibilities. With modern key sizes this is typically not a successful approach.
You might be interested in
Many people in the United States will say that they have rights, however, the majority of those people do not know what those ri
8090 [49]

Answer:

I think this answer would be...

Three of the rights guaranteed by the bill of rights would be freedom of speech, freedom of religion, and the right to bear arms. Freedom of speech lets me say what I need to or what but there are consequences to what I say. Freedom of religion allows me to practice any religion in the united states without it being illegal. The right to bear arms allows me to own a gun to hunt or protect myself when needed with a license or orange card.

3 0
3 years ago
Read 2 more answers
Write a program that lets the user guess the coin's head or tail. The program randomly generates an integer 0 or 1, which repres
svlad2 [7]

Answer:

#include <iostream>

#include <stdlib.h>

#include <time.h>

using namespace std;

int main()

{

   srand (time(NULL));  //initialize random seed

   int guess;

    int number = rand() % 2;  //generate random number 0 or 1

    cout<<"Enter the guess (0 or 1): ";

    cin>>guess;     //store in guess

    if(number == guess){     //check if number equal to guess

       cout<<"Guess is correct."<<endl;   //if true print correct message.

    }else{

        cout<<"Guess is incorrect."<<endl;  //otherwise print correct message.

    }

    return 0;

}

Explanation:

first include the three library iostream for input/output, stdlib,h for using the rand() function and time for using the time() function.

create the main function and initialize the random number generation seed, then generate the random number using the function rand() from 0 to 1.

after that, take input from user and then with the help of conditional statement if else check if random number is equal to guess number or not and print the appropriate message.

7 0
3 years ago
SQLite is a database that comes with Android. Which statements is/are correct?
oksian1 [2.3K]

Answer:

1. Wrong as per my knowledge, SQLite may be an electronic database software that stores data in relations(tables).

2. Wrong. Content provider interface controls the flow of knowledge from your android application to an external data storage location. Data storage is often in any database or maybe it'll be possible to store the info in an SQLite database also.

3.Right. SQLite uses one file to store data. It also creates a rollback file to backup the stored data/logs the transactions.

4. Wrong. The queries are almost like a traditional electronic database system, the queries are going to be answered as per the conditions given and should return a group of answers or one answer depending upon the info and sort of query used.

5. Right. A cursor helps to point to one entry within the database table. this may be very helpful in manipulating the present row of the query easily.

7 0
3 years ago
Some companies, especially consulting firms, require their employees to create ____ about sessions with clients.
Cloud [144]

Answer: Reports

Explanation:

 Some companies always ask to the employees to create the particular report for the session with their clients.

As, the report is the main communication channel between the company employees and clients where all the information are complied together and focus for transmitting the data clearly.

Efficient reports are basically help in the decision making and problem with sufficient knowledge.  

On the other hand, all the other options are not needed for session with the clients in the organization. Therefore, report is the correct option.

 

3 0
3 years ago
The program that translate the URL into an IP address is called the _____ ?
Airida [17]

Answer:

The Correct answer is  option A: Domain Name System

Explanation:

Let look at each option;

Domain Name System:

We we type an address for example brainly website  it goes to DNS server and find the IP address of the computer where brainly website  is located. Then the request goes to the IP address. This is the mechanism of DNS.

Resource Locator:

Resource Locator is the URL For example brainly website

Web Browser:  

Web browser is a software which is used for internet browsing for example Firefox

Web Server:  

Web Server is a computer which give services to clients.

7 0
3 years ago
Read 2 more answers
Other questions:
  • To create a formula in ___ you would first click in one of the cells. A.word b.excel c.facebook d.powerpoint
    13·1 answer
  • Bcghxdfghncfghndfgxdfgjfjgktyerdgftguj
    8·2 answers
  • An ipv4 address in the range 169.254.0.1 through 169.254.255.254 indicates a problem with what type of service
    10·1 answer
  • If you write a toString method to display the contents of an object, object1, for a class, Class1, then the following two statem
    14·1 answer
  • PP 11.1 – Write a program that creates an exception class called StringTooLongException, designed to be thrown when a string is
    14·1 answer
  • What are some other ways to program a robot to navigate a complicated environment other than straight paths and right angle (90
    8·2 answers
  • Give one (1) advantage and one(1) disadvantage of using and integrated software package over a custom written one.
    15·1 answer
  • 18.you need to be able to access a file stored in a shared folder on your network even when you are disconnected from the networ
    5·1 answer
  • In PowerPoint, a picture might be a photograph, a shape you draw, a piece of clip art, or an illustration created using a graphi
    7·2 answers
  • 84 104 101 32 97 110 115 119 101 114 32 105 115 32 53 48 33 There's a way to make this meaningful; find it!
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!