1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alinara [238K]
3 years ago
7

A personal identification number (PIN) that opens a certain lock consists of a sequence of 3 different digits from 0 through 9,

inclusive. How many possible PIN are there? (A) 120 (B) 360 (C) 720 (D) 729 (E) 1,000
Computers and Technology
1 answer:
Elan Coil [88]3 years ago
7 0

Answer:

<u>720</u> possible PIN can be generated.

Explanation:

To calculate different number of orders of digits to create password and PIN, we calculate permutation.

Permutation is a term that means the number of methods or ways in which different numbers, alphabets, characters and objects can arranged or organized. To calculate the permutation following formula will be used:

nPr = n!/(n-r)!

there P is permutation, n is number of digits that need to be organize, r is the size of subset (Number of digits a password contains)

So in question we need to calculate

P=?

where

n= 10   (0-9 means total 10 digits)

r= 3     (PIN Consist of three digits)

So by using formula

10P3 = 10!/(10-3)!

        =10!/7!

        = 10x9x8x7!/7!

        = 10x9x8

        = 720

You might be interested in
Information technology (IT) _____ is a framework that ensures that information technology decisions are made while taking into a
dexar [7]

Answer:

"IT governance" is the answer for the above question.

Explanation:

  • "IT governance" is a type of framework which is related to information technology and It is used to justify that the processor takes by the organization is in the right direction or not.
  • It suggests the user take the decisions to achieve the business goal for the objective of the organization.
  • The above question asked about the framework which is used to ensure the objective of a business is achieved by the process or not. So that framework is known as "IT governance".
8 0
3 years ago
Sentence used for cover letter should be??
Gala2k [10]
To whom it may concern
6 0
3 years ago
When using the camelCase naming convention, the first word of the variable name is written in lowercase and the first characters
Lerok [7]

Answer:

The answer is "True".

Explanation:

CamelCase is an invitation for the name composed of several words, it includes in one word with the first letter of each several words capitalized so, that every word which makes up into the name can be understood quickly, into this tag convention.

  • It provides capitalize on the first letter of each word, which increases the ability to read.
  • It mainly uses programming variables, SOAP, and XML.
3 0
3 years ago
Which of the following is NOT a characteristic of malware?
kherson [118]
Launch is not a characteristic of malware.
3 0
3 years ago
Explain why computers need secondary storage plz.
kondor19780726 [428]

Secondary storage is needed because it is non-volatile, it retains what's in it without the need for a power supply.

4 0
3 years ago
Read 2 more answers
Other questions:
  • To move to the most extreme right cell containing data in your worksheet, what basic key combination can you use?
    7·1 answer
  • Lesson 15: Integrated Literacy Connections Education Introduction to Computer Applications Unit 6: Internet Safety
    5·1 answer
  • g Suppose we want to compress a text consisting of 6 characters,a, b, c, d, e, fusingthe Huffman Algorithm. Give an example for
    8·1 answer
  • "When you can control devices and appliances by apps installed on your smartphone or tablet, you are said to have"
    6·1 answer
  • Which of the following is the correct ordering of operating systems, oldest to newest?
    5·2 answers
  • The photographer for "The Migrant Mother" photograph used _______________, which is a technique that would be considered unethic
    8·2 answers
  • Write a public member function which replace that replaces one occurrence of a given item in the ArrayBag with another passed as
    14·1 answer
  • Write a program that reads a list of integers into a vector, and outputs the two smallest integers in the list, in ascending ord
    5·1 answer
  • What does altgr mean on a keyboard.
    10·1 answer
  • The WordPress Widgets submenu is located where on the WordPress site?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!