1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alinara [238K]
3 years ago
7

A personal identification number (PIN) that opens a certain lock consists of a sequence of 3 different digits from 0 through 9,

inclusive. How many possible PIN are there? (A) 120 (B) 360 (C) 720 (D) 729 (E) 1,000
Computers and Technology
1 answer:
Elan Coil [88]3 years ago
7 0

Answer:

<u>720</u> possible PIN can be generated.

Explanation:

To calculate different number of orders of digits to create password and PIN, we calculate permutation.

Permutation is a term that means the number of methods or ways in which different numbers, alphabets, characters and objects can arranged or organized. To calculate the permutation following formula will be used:

nPr = n!/(n-r)!

there P is permutation, n is number of digits that need to be organize, r is the size of subset (Number of digits a password contains)

So in question we need to calculate

P=?

where

n= 10   (0-9 means total 10 digits)

r= 3     (PIN Consist of three digits)

So by using formula

10P3 = 10!/(10-3)!

        =10!/7!

        = 10x9x8x7!/7!

        = 10x9x8

        = 720

You might be interested in
________ is a process where authentication and permission will be passed on from one system to another, usually across multiple
hoa [83]

Answer: Federation

Explanation:

In multiple enterprises there are number of authentication processes to access resources and information so in order to avoid a large number of authentications we have a process called federation whereby all the authentication and authorization processes are passes from one system to the other within the enterprise.

3 0
3 years ago
Which programming languages are the best choices for desktop applications? Select 3 options.
slega [8]
The three are Python c and html
5 0
3 years ago
Read 2 more answers
What form of note taking would be MOST beneficial for a visual learner who needs to see the connections between ideas?
Svetlanka [38]

Answer:

Think link

Explanation:

8 0
3 years ago
A malicious user in your organization was able to use the Trinity Rescue Kit to change the password on a department manager's co
netineya [11]

Answer:

The answer is "The PC should be kept in a physically secure location".

Explanation:

In general, malicious users are hackers as well as malicious users. This user indicates that even a rogue worker, contractor, student, and another consumer who uses his sensitive rights is indeed a common word of violation of information in security circles and the headlines, and to manage the data from the theft the system should be on the physically secure location, that refers to any place, a room or a group of room within facilities of physical or staff security protocols that are sufficient to support the AI-based on LEIN and related Is a physically safe room.

7 0
3 years ago
Linda is training to become a certified network design expert and consultant. While researching about the process of cellular ra
mel-nik [20]

Answer:

a. The cell tower forwards the call to the wireless provider's Mobile Telephone Switching Office

Explanation:

When a cell phone user begins to make a call, it is picked up by the cell tower located in the cell in which the cell phone is located and that belongs to the user's wireless provider. The next step in this process is that the cell tower forwards the call to the wireless provider's Mobile Telephone Switching Office.

8 0
3 years ago
Other questions:
  • A custom date format set for a date/time field that contains the symbols mmm/dd/yy would display the date as ____.
    12·1 answer
  • Which option organizes tasks based on importance?
    12·1 answer
  • How much health did a supply drop balloon originally have??
    7·2 answers
  • In Microsoft word you can access the blank command from the mini toolbar
    7·1 answer
  • Please list ten things that you have learned an Excel Spreadsheet can do.
    7·1 answer
  • How many bits can a memory chip with the below configuration support? For full credit, show how you got the answer.
    15·1 answer
  • You cannot then move and resize the control on the form as desired with your mouse TRUE OR FALSE​
    6·2 answers
  • Your personal opinion about what a "successful" console in the future will need to include to sell well. How have the changes in
    12·1 answer
  • What is a circular network.​
    6·2 answers
  • As part of their extensive kitchen remodel, the Lees told their electrical contractors that they would need plenty of outlets fo
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!