1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vera_Pavlovna [14]
3 years ago
15

If we are using an 4-character password that contains only lowercase English alphabetic characters (26 different characters), ho

w many *more* possible passwords are there if we use a 5-character password (still only lowercase English alphabetic characters?
Computers and Technology
2 answers:
Trava [24]3 years ago
6 0

Answer:

11,424,400 possible passwords

Explanation:

Since all characters are letters and only lowercase

we have 26∧4 = 456,976 possibilities

For a 5-character password which is still lower case sensitive.

we have 26∧5 = 11,881,376 possibilities

Many more possible passwords = (11881376-456976)

= 11,424,400 possible passwords

slavikrds [6]3 years ago
4 0

Answer:

If we are using a 4-character password that contains only lowercase alphabets and repetition of these alphabets are allowed then the possible passwords are:      

26 * 26 * 26 * 26 = 26 ^ 4 = 456976

If we are using a 4-character password that contains only lowercase alphabets and repetition of these alphabets are not allowed then the possible passwords are:

n! / (n - r )! = 26! / (26 - 4)! = 358,800

Explanation:

If we are using a 5-character password that contains only lowercase alphabets and repetition of these alphabets are allowed then the possible passwords are:

26 * 26 * 26 * 26 * 26 = 26 ^ 5 = 11881376

If we are using a 5-character password that contains only lowercase alphabets and repetition of these alphabets are not allowed then the possible passwords are:

n! / (n - r )! = 26! / (26 - 5)! = 7893600

how many *more* possible passwords are there if we use a 5-character password:

Possible passwords when we use 5 character passwords - Possible passwords when we use 4 character passwords.

11881376 - 456976 = 11424400

You might be interested in
If a user would like to modify margins to specific settings, users would need to select the _____ option.
RSB [31]
If a user would like to modify margins to specific settings, users would need to select the <span><u>Custom Margins</u> </span>option.
4 0
3 years ago
A ___________ allows Internet telephony service providers to deliver telephony services and unified communications applications
Firlakuza [10]

Answer: SIP Trunk

Explanation:

   The SIP is stand for the session initiation protocol trunk is one of the service that is specifically provided by the service provider and the main purpose of the SIP trucking is to manage the VoIP call process (Voice over IP).

According to the given question, SIP is one of the protocol that allow telephony services for the communication purpose and it also offer the video, Message, media and the voice application and these process are control by using this type of technology.  

 Therefore, SIP Truck is the correct answer.  

8 0
3 years ago
Explain block diagram of. computer architure​
ozzi

Answer:

A block diagram is a diagram of a system in which the principal parts or functions are represented by blocks connected by lines that show the relationships of the blocks. They are heavily used in engineering in hardware design, electronic design, software design, and process flow diagrams.

Explanation:

In your question you asked architure but maybe it is architecture (•;

5 0
2 years ago
True or false :Beyond fulfilling legal obligations, a diverse workplace offers many other benefits as well.
KengaRu [80]
The answer to your question is true.
7 0
3 years ago
Define the term editing​
Harrizon [31]

Answer:

editing is a word file mean making changes in the text contain is a file. or a word file is one of the most basic ms office word operation.

8 0
3 years ago
Other questions:
  • An authenticated user can add up to how many computer accounts to the domain, by default
    6·1 answer
  • 1. What is the main factor that affects Earth’s average temperature?
    12·1 answer
  • In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering the passkey in a matter of s
    6·2 answers
  • Which of the following can you use to add a picture to your presentation?
    14·1 answer
  • WILL DO A BRIANLY! Use an algorithm to help the Python Turtle get to the finish line in 10 steps by using only the 3 commands be
    12·1 answer
  • What development first helped people shape their communities through<br> informed decisions?
    5·1 answer
  • The 60-watt light bulb has a 400 hour life expectency how much will it cost to operate during its time
    14·1 answer
  • What is connected to the base unit in Desktop PC?
    14·1 answer
  • What is a personal data?
    12·1 answer
  • Buying a home security system is an example of protecting your home against________.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!