1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sertanlavr [38]
3 years ago
14

a password to a certain database consists of digits that cannot be repeated. if the password is known to consist of at least 8 d

igits and it takes 12 seconds to try one combination, what is the amount of time, in minutes, necessary to guarantee access to the database
Computers and Technology
1 answer:
BaLLatris [955]3 years ago
7 0

Answer:

\frac{10!}{2}mins

Explanation:

12 seconds to try one combination will be equivalent to  \frac{1}{12}\times 60 = \frac{1}{5} \ mins

Password contain at least 8 digit i.e. password can contain 8, 9, 10 digit.

Password cannot contain more than 10 digit because it will give room for repetition which it is clearly stated that digit cannot be repeated.

Possible digit that can be used: 9,8,7,6,5,4,3,2,1,0.

Total number of passwords combination possible for each position in 8 digit.

1st position = 10, 2nd position = 9, 3rd position = 8, 4th position = 7, 5th position = 6, 6th position = 5, 7th position = 4, 8th position = 3. Total number of passwords combination possible in 8 digit is equivalent to \frac{10!}{2}.

Total number of passwords combination possible for each position in 9 digit.  

1st position = 10, 2nd position = 9, 3rd position = 8, 4th position = 7, 5th position = 6, 6th position = 5, 7th position = 4, 8th position = 3, 9th position = 2. Total number of passwords combination possible in 9 digit is equivalent to \frac{10!}{1}.

Total number of passwords combination possible for each position in 10 digit.

1st position = 10, 2nd position = 9, 3rd position = 8, 4th position = 7, 5th position = 6, 6th position = 5, 7th position = 4, 8th position = 3, 9th position = 2, 10th position = 1.  Total number of passwords combination possible in 10 digit is equivalent to 10!.

Adding them up and multiplying by  \frac{1}{5} \ mins  to get the total number of time needed to guarantee access to database =  [\frac{10!}{2}\times\ \frac{10!}{1} \times 10!] \frac{1}{5}\ mins = \frac{10!}{2}

You might be interested in
When copying Word document content to an Excel spreadsheet, how many paste options are available from the Paste Options button?
solniwko [45]
The answer is B two. Excel gives you the option to Keep Source Formatting or Match Destination Formatting. 

Hope this help :-)

5 0
2 years ago
Read 2 more answers
If you have columns that are truncating your content (not showing all the content), but you cannot increase the width of the wor
mezya [45]

Answer:

Use the Wrap text button

Explanation:

A wrapped cell allows users to insert text into cells in Excel without truncating the contents of the cell. This makes the data in this cell very easy to read.

Follow these steps to wrap your text:

  1. Click on the cell that you want to format
  2. On the Home tab, click the wrap text button
  3. Do all for all the cells affected.

The wrap text function will help to make the text visible without losing data.

4 0
3 years ago
Desirable characteristics of designs include:
polet [3.4K]

Answer: High cohesion

Explanation: Cohesion in general refers to make a couple of the functions or characteristics to share the functions and content . In the field of computer science , cohesion is the best characteristic that can be included in the design because it connect the  various software so that they can share the responsibilities , function and can achieve better output through this. Thus high cohesion is the most preferred factor.

8 0
3 years ago
What are the features of page layout
bagirrra123 [75]

Typical page layout decisions include:

Size of page margins.

Size and position of images and figures.

Deciding on the number and size of columns and gutters (gaps between columns)

Placement of intentional whitespace.

4 0
2 years ago
Read 2 more answers
Valid quadruples programming solution​
kompoz [17]

Answer:

whaattt

Explanation:

5 0
2 years ago
Other questions:
  • In a network, a computer that performs specific services for other computers on the network is called a
    5·1 answer
  • 2. Research, find and use a better (different from the simple Shift Cipher) encryption technique to encrypt a string of your cho
    15·1 answer
  • What are the two basic categories of film
    5·1 answer
  • int temp; temp = 180; if ( temp > 90 ) { System.out.println( "This porridge is too hot." ); // cool down temp = temp – ( temp
    9·1 answer
  • If you are a mathematics student and want to study the secret of writing cryptographic codes, algorithms, encryption and decrypt
    14·1 answer
  • 100 points, PLEASE HELP...To generate numbers between and including -10 to 10 you would use:
    5·1 answer
  • Which of the following electronic collaboration techniques is the best
    6·2 answers
  • Can anyone tell me this answer?
    14·1 answer
  • What product use programmable control?
    11·1 answer
  • How to use boolean to check if math answer is correct java
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!