1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BigorU [14]
3 years ago
15

An operating system____a password for a given user, converting it into a representation that cannot be understood without the ap

propriate algorithm
1cracks
2reverses
3encrypts
4decrypts
Computers and Technology
1 answer:
Ierofanga [76]3 years ago
6 0

An operating encrypts system a password for a given user, converting it into a representation that cannot be understood without the appropriate algorithm

3 encrypts

<u>Explanation:</u>

Normally end user login with user id account with password as login authorization or authentication to operate the system. There are some many technologies for login methods are used. Nowadays to login to operating system bio matric device is also been used.

In windows 10 pin also be used for login to operating systems. In Windows 10 operating system Hotmail accounts (clouds access also been used) so that related windows store or clipboard history are stores across the desktop and laptop.

Cracks: - some algorithm was used to crack password of login for operating system access.

Reverses- it a process or algorithm where reverse   password or example: - 1234 where password in reverse process 4321.

Encrypts:- A password is  encrypts with some calculation or string or some value. Cracking the password is used by using decrypts technology.

Decrypts is reverse logic applied based on encrypts technology.

You might be interested in
Write a Java program that generates a new string by concatenating the reversed substrings of even indexes and odd indexes separa
salantis [7]

Answer:

/ReversedEvenOddString.java

import java.util.Scanner;

public class ReversedEvenOddString {

   public static void main(String[] args) {

       Scanner sc = new Scanner(System.in);

       String s = sc.nextLine();

       String evens = "";

       String odds = "";

       for(int i = s.length()-1;i>=0;i--){

           if(i%2==1){

               odds += s.charAt(i);

           }

           else{

               evens += s.charAt(i);

           }

       }

       String res;

       if(s.length()%2==1){

           res = evens+odds;

       }

       else{

           res = odds+evens;

       }

       System.out.println(res);

   }

}

8 0
4 years ago
How can a user view the options for Junk E-mail?
alexdok [17]
B. by right clicking all messages in the junk email folder
8 0
3 years ago
Read 2 more answers
What does the key combination ctrl+s achieve?
erastovalidia [21]
Control + S I suppose saves files
7 0
4 years ago
Read 2 more answers
In which year was chip used inside the computer for the first time?? ​
AfilCa [17]

the first chip was invented in 1975

hope this help!

5 0
3 years ago
Read 2 more answers
Programmers refer to a sequence of characters as a ____.
jekas [21]
In programming they know it as a String which is  a sequence of characters that are composed of literal constants or some kind of variables. A sting is any finite sequence of characters. every single string has its own lenght and this is one of the most important characteristics of them. Strings are essential to communicate information from the program to the user. 
5 0
3 years ago
Other questions:
  • From the ages of 18 to 24, individuals born from 1980 to 1984 held an average of 6.2 jobs—which is slightly higher than the numb
    10·1 answer
  • Explain The Two Way Communication in full.
    10·1 answer
  • If an app needs to perform a derived-class-specific operation on a derived class object reference by a base class variable, the
    9·1 answer
  • Which remote assistance option requires peer name resolution protocol (pnr) and ipv6?
    5·1 answer
  • If a CPU receives theinstruction to multiply the byte-sized values $12 and $3E, thisaction will take place in the ______________
    13·1 answer
  • One lap around a standard high-school running track is exactly 0.25 miles. Write a program that takes a number of miles as input
    12·2 answers
  • Different network devices function at different network communication layers, depending on their purpose. Using the TCP/IP model
    7·1 answer
  • You have recently subscribed to an online data analytics magazine. You really enjoyed an article and want to share it in the dis
    9·1 answer
  • A router periodically goes offline. Once it goes offline, you find that a simple reboot puts the router back online. After doing
    12·1 answer
  • The agency that started ARPANET was looking for
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!