1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Igoryamba
4 years ago
11

(BRAINLIEST QUESTION!!!)

Computers and Technology
1 answer:
docker41 [41]4 years ago
4 0

Answer:

Possible if hackers are not so intelligent.

Explanation:

Actually, hackers are intelligent

where they will change location code in different places every second. So end-user who is trying to trace it he or she has to use their intelligence to find the exact location of hackers.

Normally hackers will generate different location places and by using decipher it is possible to find the location codes.

Since hackers used encrypted message we need to decrypts the message and find it out and understand the decrypt and encrypt technology used by hackers.

It is possible to by using decipher to get uncovered locations

You might be interested in
which shortcut can we use to make directional heading of a cuboid more obvious while in the lidar view​
Lady bird [3.3K]

Answer:

cutting across

Explanation:

4 0
3 years ago
Some Web sites impose certain rules for passwords. Write a function that checkswhether a string is a valid password. Suppose the
Levart [38]

Answer:

def check_password(pwd):

   c=0

   d=0

   for i in pwd:

       if (i>='a' and i<='z') or (i>='A' and i<='Z'):

           c+=1

       elif i>='0' and i<='9':

           d+=1

           c+=1

   if len(pwd)==c and d>=2 and len(pwd)>=8:

       print("valid password")

   else:

       print("Invalid password")

 

ps=input("Enter password for checking : ")

check_password(ps)

Explanation:

  • Loop through the password and check if it contains any alphabet.
  • Increment the counter if it contains any alphabet.
  • If it contains a number, increment both c and d variables.
  • Finally display the relevant message.
6 0
3 years ago
why is it important to include keywords that represent each of the essential concepts that make up your research question when y
SpyIntel [72]

Answer:

hi

Explanation: hi

7 0
3 years ago
A smart speaker has no screen or keypad for changing its settings. Order three steps to configure the speaker.
kirill [66]

A smart speaker has no screen or keypad for changing its settings.

The steps we will follow to configure the speaker are

  • Firstly we need to enter the password to the speaker’s Wi-Fi hotspot .so that we can connect the speakers Wi-Fi.
  • Secondly we should connect the smartphone to the speaker’s Wi-Fi hotspot.
  • Thirdly we should download  the speaker’s app to a smartphone.So that we can operate the speaker

Explanation:

A smart speaker has no screen or keypad for changing its settings.The steps we will follow to configure the speaker are

  • Firstly we need to enter the password to the speaker’s Wi-Fi hotspot .so that we can connect the speakers Wi-Fi.
  • Secondly we should connect the smartphone to the speaker’s Wi-Fi hotspot.
  • Thirdly we should download  the speaker’s app to a smartphone.So that we can operate the speaker

Thus above mentioned is the order of the three steps that we need to follow in order to configure the speaker.

4 0
4 years ago
Help??????????????????
romanna [79]
8,5,3,6,1,2,7,4 there you go bud

7 0
3 years ago
Other questions:
  • A. True
    6·1 answer
  • What does CTR stand for?
    10·2 answers
  • Jabari is writing a program which prompts a user for a value with a decimal. Which function should he use? float() int() print()
    9·2 answers
  • Who is the founder of javascript? ​
    14·2 answers
  • Can someone please find the IP address of a 3630 hp printer?
    8·1 answer
  • What are the differences between tkinter toolkit and PyQt?
    14·1 answer
  • Pls help computer science I will give brainliest
    8·2 answers
  • A computer is assigned an IP address of 169.254.33.16. What can be said about the computer, based on the assigned address?
    9·1 answer
  • References inserted initially as footnotes can be converted to endnotes through an option in the software.
    10·2 answers
  • I am trying to go into my outlooks, email but it says. :-( Something went wrong You're currently signed in as ||my hotmail|| . P
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!