1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetllana [295]
4 years ago
9

Not having the computer echo the password is safer than having it echo an asterisk for each character typed, since the latter di

scloses the password length to anyone nearby who can see the screen. Assuming that passwords consist of upper and lower case letters and digits only, and that passwords must be a minimum of five characters and a maximum of eight characters, how much safer is not displaying anything?
Computers and Technology
1 answer:
STALIN [3.7K]4 years ago
3 0

Answer:

Up to 99.99958% safer

Explanation:

Assuming the attacker knows the password restrictions (upper and lower case letters and digits only)

Lets calculate the password combinations for each possible length:

Total characters possible: [a-z]+[A-Z]+[0-9] = 62

(A) Passwords of length = 8  ->  62^8=218,340,105,584,896

(B) Passwords of length = 7  ->  62^7=3,521,614,606,208

(C) Passwords of length = 6  ->  62^6=56,800,235,584

(D) Passwords of length = 5  ->  62^5=916,132,832

If length is not known, but between 5 and 8:

(E) Passwords of length = [5-8] ->  

\sum_{5 \to 8} 62^{n} = \frac{62^9-62^5}{62-1}=221,919,436,559,520

Finally, to compare how much safer is to keep the password length hidden, we'll calculate the percentage of (A) to (D) passwords against (E)

The formulas are:  

1-\frac{(A)}{(E)} *100 = 1.61\% safer

1-\frac{(B)}{(E)} *100 = 98.41\% safer

1-\frac{(C)}{(E)} *100 = 99.97\% safer

1-\frac{(D)}{(E)} *100 = 99.99958\% safer

You might be interested in
Which is a correct statement about having access to technology in a study environment?
Debora [2.8K]
The answer is the 3rd option : Using a computer to research information can be helpful.

Hope this helps!! :)

5 0
3 years ago
Read 2 more answers
Chris wants to view a travel blog her friend just created. Which tool will she use?
wolverine [178]

Answer:

Web browser

Explanation:

7 0
3 years ago
For backing up pictures, music, and videos from a mobile device, what should be used so that these files synchronize across devi
Oxana [17]
*A cloud service* provides a type of storage that can be used to transfer memory to multiple devices by simply using an email and password
4 0
3 years ago
Write a program that outputs "Hello World!".
tekilochka [14]
Print(“Hello World!”)

I hope this helps :) I’m sry is this what you wanted or were you looking for something else because I’m willing to help either way.
4 0
2 years ago
Careers in the Transportation and logistics career cluster are
Harman [31]

Answer:

Students in transportation, distribution and logistics learn and practice skills that prepare them for diverse post-high school education and training opportunities, from apprenticeships and two-year college programs to four-year college and graduate programs.

Explanation:

CTE classes in this cluster will introduce you to a variety of interesting careers including.

  • Engineer: Aerospace, flight, railway, industrial health and safety
  • Air traffic controller
  • Airline pilot
  • Urban or regional planner
  • Logistician
  • Shipping and receiving supervisor
  • Storage and distribution managers
  • Operations technician
  • Industrial equipment mechanic
  • Auto or auto body mechanic
  • Vehicle and system inspector
  • Railroad safety inspector
  • Health and safety manager
  • Marketing manager
  • Sales representative
  • Flight attendant
5 0
4 years ago
Other questions:
  • After modifying the font of the Subheading1 style, you notice that the font of Subheading2 has also changed. What is the most li
    12·2 answers
  • By default, EC2 instances pull SQS messages from an SQS queue on a FIFO basis.
    6·1 answer
  • . Service recovery refers to A. the ability to quickly restore service following a service failure and provide compensation. B.
    5·1 answer
  • Which describes the first step a crawler-based search engine uses to find information?
    14·2 answers
  • BRAINLIEST You have a small company and want to keep your costs low, but it is important your employees share data. Which networ
    13·2 answers
  • Edhesive 4.6 lesson practice <br><br> Range is an example of a_______.
    10·2 answers
  • We _____to separate the code in sub programs from the main code<br><br> Please help!!
    10·2 answers
  • What is a fruitful function? Explain with help of programming example?<br> plz
    7·1 answer
  • What network problems can be solved on your<br> end?
    13·2 answers
  • Instrument Air system that employ a standby header shall be permitted to have a simplex cooler and dryer. Where a standby header
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!