1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex73 [517]
3 years ago
10

Some IOS commands store passwords as clear text, but you can then encrypt the passwords with the service password-encryption glo

bal command. By comparison, other commands store a computed hash of the password, rather than storing the password. Comparing the two options, which one answer is the most accurate about why one method is better than the other?
A. Using hashes is preferred because encrypted IOS passwords can be easily decrypted.B. Using hashes is preferred because of the large CPU effort required for encryption.C. Using encryption is preferred because it provides stronger password protection.D. Using encryption is preferred because of the large CPU effort required for hashes.
Computers and Technology
1 answer:
marta [7]3 years ago
8 0

Answer:

A

Explanation:

Using hashes is preferred because encrypted IOS passwords can be easily decrypted.

You might be interested in
A leading pharmaceutical company is launching a major transformation of its entire Cloud operations in order to more quickly and
Deffense [45]

A cloud-first strategy helps this client by providing a data-centric approach that offers more speed, agility, and security. Thus, the correct option is B.

<h3>What is a Cloud-first strategy?</h3>

A cloud-first strategy may be defined as an operational strategy that allows the users to reposition all or most of their infrastructure to cloud-computing platforms.

A cloud-first strategy helps this client in numerous ways. It provides a data-centric approach that offers more speed, agility, and security to its customers or clients in a facilitated manner.

Therefore, the correct option for this question is B.

To learn more about the Cloud-first strategy, refer to the link:

brainly.com/question/24719487

#SPJ1

7 0
2 years ago
Please write a complete program to calculate monthly payment given
jasenka [17]

Explanation:

Code with comments:

#include <stdio.h>

#include <math.h>  

/* math library is required to use pow() function

First we need to create a function to calculate the Monthly Payment

It would take three inputs Rate, Years, and Principle amount

Then we converted the Rate and Months according to problem statement

pow() function is used to find (1+R)^M

Then finaly this function returns the value of Monthly Payment  */

float MonthlyPay(float R, int M, int P)

{

    R=R/1200;

    M=M*12;

   float po=pow((1+R),M);

   float PayM=(R+(R/(po-1)))*P;

    return PayM;

}

/*  In the main() function we get 3 inputs from the user Years, Rate and Principle amount

then we call the MonthlyPay function and pass it 3 inputs that we got from the user

then we calculated the total Payment by multiplying the Monthly Pay and total number of months

then we calculated the interest Amount by subtracting the Principle Amount from total Pay

Testing is performed and output result is given at the end and also attached in the image   */

int main(void)

{

    float Rate;

    int Year, Amount;

    printf("Enter Years: ");

    scanf("%d",&Year);

    printf("Enter Rate: ");

    scanf("%f",&Rate);

    printf("Enter Principle Amount: ");

    scanf("%d",&Amount);

   

    float Pay = MonthlyPay(Rate, Year, Amount);

    printf ("Monthly Payment is: %f \n", Pay);

    float totalPay=Pay*Year*12;

    printf ("Total Payment is: %f \n", totalPay);

    float interest=totalPay-Amount;

    printf ("Interest Expense is: %f \n", interest);

    return 0;

}

Output:

Enter Years: 5

Enter Rate: 7

Enter Principle Amount: 12200

Monthly Payment is: 241.572767

Total Payment is: 14494.367188

Interest Expense is: 2294.367188

7 0
3 years ago
Design a 128KB direct-mapped data cache that uses a 32-bit address and 16 bytes per block. The design consists of two components
Kitty [74]

Answer:

See the attached pictures for detailed answer.

Explanation:

The cache contain 8K number of blocks.each block has 16 Byte worth of data. Each of these bytes are addressable by block offset. Now, each of these blocks are addressable and their address is provided by line offset or set offset. If block number is given in Decimal format then the block to which that block will be mapped is given by expression

mappedToBlock = (bNumber)mod2​​​13

TAG and valid but consititues something called cache controller. TAG holds the physical address information because the TAG in physical address get divided into TAG and line offset in cache address. Valid bit tells status of blocks. If it is 1 then data blocks are referred by CPI else not.

7 0
3 years ago
The theory advanced by Adam Smith,
tester [92]

Answer:

Definition: The unobservable market force that helps the demand and supply of goods in a free market to reach equilibrium automatically is the invisible hand. Description: The phrase invisible hand was introduced by Adam Smith in his book 'The Wealth of Nations'.

so ans is the invisible hand

hope help full thnk u❤️❤️❤️

3 0
2 years ago
You have just used a command that produced some interesting output on the screen. You would like to save that information into a
Bogdan [553]

Answer: A. > interesting.txt

Explanation: From the command line, one can perform numerous tasks from navigating into a directory, creating a new directory, deleting files, create files, modify files and so on using simple commands. In the scenario above, after using a common which is used to produce an output on the screen, such as the 'echo' command, one may wish to save the file giving the user the ability to access the file later. Since it is stated the file name 'interesting.txt' given to the file does not currently exist, appending the sign > saves the file. If the filename already exists, it will overwrite the existing content.

6 0
3 years ago
Other questions:
  • What do you remember about the difference between Canadian and US dollar (which one is greater)? Also, explain which online tool
    6·1 answer
  • Which element of a business document provides additional information but is not a part of the body of the text?
    13·2 answers
  • ACL 1 has three statements, in the following order, with address and wildcard mask values as follows: 1.0.0.0 0.255.255.255, 1.1
    6·1 answer
  • By default, PowerPoint ends a slide show with a black slide. <br> a. True<br> b. False
    5·2 answers
  • Define algorithm<br> Write a small algorithm
    15·2 answers
  • Computer Science uses the power of ______________ to solve problems.
    10·1 answer
  • Running away from home
    11·2 answers
  • When you create a user with the useradd command, what is the immediate state of it?
    6·1 answer
  • Why is it important to prepare the farm resources before you start working? explain​
    14·1 answer
  • Define a function Output Value() that takes two integer parameters and outputs the sum of all negative integers starting with th
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!