1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vera_Pavlovna [14]
3 years ago
15

If we are using an 4-character password that contains only lowercase English alphabetic characters (26 different characters), ho

w many *more* possible passwords are there if we use a 5-character password (still only lowercase English alphabetic characters?
Computers and Technology
2 answers:
Trava [24]3 years ago
6 0

Answer:

11,424,400 possible passwords

Explanation:

Since all characters are letters and only lowercase

we have 26∧4 = 456,976 possibilities

For a 5-character password which is still lower case sensitive.

we have 26∧5 = 11,881,376 possibilities

Many more possible passwords = (11881376-456976)

= 11,424,400 possible passwords

slavikrds [6]3 years ago
4 0

Answer:

If we are using a 4-character password that contains only lowercase alphabets and repetition of these alphabets are allowed then the possible passwords are:      

26 * 26 * 26 * 26 = 26 ^ 4 = 456976

If we are using a 4-character password that contains only lowercase alphabets and repetition of these alphabets are not allowed then the possible passwords are:

n! / (n - r )! = 26! / (26 - 4)! = 358,800

Explanation:

If we are using a 5-character password that contains only lowercase alphabets and repetition of these alphabets are allowed then the possible passwords are:

26 * 26 * 26 * 26 * 26 = 26 ^ 5 = 11881376

If we are using a 5-character password that contains only lowercase alphabets and repetition of these alphabets are not allowed then the possible passwords are:

n! / (n - r )! = 26! / (26 - 5)! = 7893600

how many *more* possible passwords are there if we use a 5-character password:

Possible passwords when we use 5 character passwords - Possible passwords when we use 4 character passwords.

11881376 - 456976 = 11424400

You might be interested in
If you wanted to detect x-rays coming from the sun,where would you place the detector? Why?
Temka [501]
You would place it in orbit around Earth, as most X-rays are absorbed by the atmosphere, so you would want the detector outside of the atmosphere to accurately detect the X-rays.
5 0
3 years ago
What have been three technological changes to photography in the past 200 years?
kolbaska11 [484]
I hope this helps but cars, phones and computers.
3 0
3 years ago
Which form of malware contains hidden code that is triggered by meeting or reaching a specific condition? (A) Trap door (B) Viru
Alborosie

Answer:

D- Trojan Horse

Explanation:

Trojan horse is a malware that has hidden code and look legitimate in order to damage or transfer harmful action on the computer.

Example hackers can disguise as Trojan horse by spying on the victims computer in order to gain access to sensitive data on the computer over the network.

3 0
3 years ago
What command can you use if you accidentally delete a sentence in your document?
damaskus [11]

Answer:

undo

Explanation:

or ctrl z

hope this helps

6 0
3 years ago
Read 2 more answers
Where is the start frame delimiter found in the Ethernet frame
Ksju [112]
Answer: The SFD is the eight-bit (one-byte) value that marks the end of the preamble, which is the first field of an Ethernet packet, and indicates the beginning of the Ethernet frame.
8 0
3 years ago
Other questions:
  • Which statement describes the word "iterative"?
    7·2 answers
  • Which major milestones started off the progression that led to the modern computers we play games on now? What do you think affe
    14·1 answer
  • ​_______ consists of the analysis​ tools, technologies, and processes by which marketers dig out meaningful patterns in big data
    7·1 answer
  • ________ is the abbreviation for the place in the computer where the programs and data the computer is currently using are store
    8·1 answer
  • The two ways to use the help menu is by searching of the contents or searching the _____
    13·2 answers
  • Use the following cell phone airport data speeds​ (Mbps) from a particular network. Find P10. 0.1 0.1 0.3 0.3 0.3 0.4 0.4 0.4 0.
    7·1 answer
  • Please code this in c++
    10·1 answer
  • When creating envelopes, how will you adjust the layout?
    10·2 answers
  • Question # 1 Multiple Select Which of the following shows the assignment of a string to a variable? Select 3 options. answer = "
    7·2 answers
  • . Which responsibility belongs to the marketing function?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!