1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alinara [238K]
3 years ago
7

A personal identification number (PIN) that opens a certain lock consists of a sequence of 3 different digits from 0 through 9,

inclusive. How many possible PIN are there? (A) 120 (B) 360 (C) 720 (D) 729 (E) 1,000
Computers and Technology
1 answer:
Elan Coil [88]3 years ago
7 0

Answer:

<u>720</u> possible PIN can be generated.

Explanation:

To calculate different number of orders of digits to create password and PIN, we calculate permutation.

Permutation is a term that means the number of methods or ways in which different numbers, alphabets, characters and objects can arranged or organized. To calculate the permutation following formula will be used:

nPr = n!/(n-r)!

there P is permutation, n is number of digits that need to be organize, r is the size of subset (Number of digits a password contains)

So in question we need to calculate

P=?

where

n= 10   (0-9 means total 10 digits)

r= 3     (PIN Consist of three digits)

So by using formula

10P3 = 10!/(10-3)!

        =10!/7!

        = 10x9x8x7!/7!

        = 10x9x8

        = 720

You might be interested in
The trade winds are the dominant surface winds from the subtropics to high latitudes. 1. True 2. False
Hatshy [7]

Answer:FALSE

Explanation: ITS THE WESTERLIES

5 0
4 years ago
If an organization’s DNS server can resolve a DNS request from its own cache, the DNS server is said to be ____.
abruzzese [7]

Answer:

Answered below

Explanation:

The DNS server is said to be a caching-only DNS server.

A caching-only Domain Name System server, works by recieving queries from the client, proceeds to perform queries against other named servers, then caches the results and returns the results to the client.

Subsequent queries are resolved and returned for the specified host straight from the the cache, by the server, instead of submitting to the external server.

The advantage of this process is that it reduces traffic from outgoing DNS and speeds up the name resolution. Also, there is a reduction in the amount of query traffic.

6 0
3 years ago
Applications on the Android OS are mostly written in what programming language?
DochEvi [55]

<span>Applications on the Android OS are written in JAVA programming language. JAVA Programming language is considered one of the most popular and used programming language by mostly developers. JAVA was developed in the year 1995. In order to make an Android app, the programmer should know the programming language by heart.</span>

5 0
4 years ago
An organization's IRP prioritizes containment over eradication. An incident has been discovered where an attacker outside of the
djyliett [7]

Answer:

a. Remove the affected servers from the network.

Explanation:

An organization's incident response process (IRP) can be defined as all of the process involved in the cleanup and recovery of data when they fall victim to an attack or cybersecurity breach. The incident response process comprises of six (6) important stages and these are;

1. Preparation.

2. Detection and analysis (identification).

3. Containment.

4. Eradication.

5. Recovery.

6. Review of incident activities.

When an organization's IRP prioritizes containment over eradication and an incident is discovered, where an attacker outside the organization installed a crypto-currency mining software on the organization's web servers. Given the organization's stated priorities, the cybersecurity engineer should remove the affected servers from the network.

A containment process is focused on taking steps to eliminate or contain the attack. It basically involves acting swiftly in response to the attack, so as to prevent it from spreading across board or in order to mitigate the damage already caused.

In this context, the cybersecurity engineer should remove the affected servers from the network in accordance with the organization's IRP priority (containment).

<em>Furthermore, he could take a step further to contain the attack by installing a firewall and updating their policies in the Intrusion Prevention System (IPS) of the organization. </em>

5 0
4 years ago
Due to the wildfires in Australia, the Red Cross has asked for assistance in determining how many trees were destroyed per hecta
kobusy [5.1K]

Answer:

1.trees_destroyed_per_hectare = 456/2.47  

2. input(no_of_hectares)  

3. no_of_trees_destroyed =no_of_hectares * trees_destroyed_per_hectare

4. print(no_of_trees_destroyed)

Explanation:

1.trees_destroyed_per_hectare = 456/2.47  //conversion of tress destroyed   per acres to hectare

2. input(no_of_hectares)  // get input from user in hectares that how many hectares are destroyed

3. no_of_trees_destroyed =no_of_hectares * trees_destroyed_per_hectare // total number of trees destroyed by fire on given day and given area

4. print(no_of_trees_destroyed)

7 0
3 years ago
Other questions:
  • What do we call the distribution and access of illegal copies of digital books??
    10·1 answer
  • Letm1, m2,···mnbe distinct numbers on the number line, in the increasing order. Your goalis to color all of them blue. You have
    9·1 answer
  • Write a function called line_numberthat takes as parameters two strings representing file names. Assume these are text files. Th
    15·1 answer
  • Instructions:Select the correct answer.
    8·2 answers
  • Select the correct statement(s) regarding a Network Access Point (NAP), also known as an Internet Exchange Point (IXP). a. At a
    12·1 answer
  • Pls help me!! I will give 35 points and mark brainliest !!!
    10·1 answer
  • What are some of the issues that create conflict in the future and why?
    12·1 answer
  • Type of operating system used i handleheld device
    6·1 answer
  • Trade Periodicals are usually highly scholarly resources<br> True<br><br> False
    5·1 answer
  • Need help ASAP.<br> I am so lost.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!