1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BigorU [14]
2 years ago
15

An operating system____a password for a given user, converting it into a representation that cannot be understood without the ap

propriate algorithm
1cracks
2reverses
3encrypts
4decrypts
Computers and Technology
1 answer:
Ierofanga [76]2 years ago
6 0

An operating encrypts system a password for a given user, converting it into a representation that cannot be understood without the appropriate algorithm

3 encrypts

<u>Explanation:</u>

Normally end user login with user id account with password as login authorization or authentication to operate the system. There are some many technologies for login methods are used. Nowadays to login to operating system bio matric device is also been used.

In windows 10 pin also be used for login to operating systems. In Windows 10 operating system Hotmail accounts (clouds access also been used) so that related windows store or clipboard history are stores across the desktop and laptop.

Cracks: - some algorithm was used to crack password of login for operating system access.

Reverses- it a process or algorithm where reverse   password or example: - 1234 where password in reverse process 4321.

Encrypts:- A password is  encrypts with some calculation or string or some value. Cracking the password is used by using decrypts technology.

Decrypts is reverse logic applied based on encrypts technology.

You might be interested in
can anyone sub to my youttube channel pls, its called Yakobu, and Im trying to reach 100 subs by the end of the month :)
allsm [11]

Answer:

Sure

Explanation:

3 0
2 years ago
________ are viruses that masquerade as useful programs or files. hydras spyware programs worms adware programs trojan horses
Harrizon [31]
Trojan horse is the correct answer
5 0
3 years ago
What is a text feature that could add visual interest and clarity to a procedural document?
rjkz [21]

Bullet points is another

3 0
2 years ago
Read 2 more answers
In the __________ phase of the SecSDLC, the team studies documents and looks at relevant legal issues that could affect the desi
mina [271]

In the Analysis phase of the SecSDLC, the team studies documents and looks at relevant legal issues that could affect the design of the security solution.

<h3>What is this stage about?</h3>

This is known to be the phases of development where there is  Analysis or one can say requirements gathering and where one has clearly set out problem or project as well as others.

Note that In the Analysis phase of the SecSDLC, the team studies documents and looks at relevant legal issues that could affect the design of the security solution.

Learn more about Analysis phase from

brainly.com/question/13897351

#SPJ1

5 0
2 years ago
Has anyone done the unit 10 lesson 9 encryption/decryption texts on code.org?
Pani-rosa [81]

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

5 0
3 years ago
Other questions:
  • Apple users tend to like the company and love its products. Apple has successfully nurtured this __________ component of its cus
    15·1 answer
  • When troubleshooting a desktop motherboard, you discover the network port no longer works. What is the best and least expensive
    12·1 answer
  • In a ______topology, every device has exactly two neighbors for communication purposes. A failure in any cable or device can tak
    15·2 answers
  • What is the role of the W3C? Group of answer choices oversee research and set standards for many areas of the Internet supervise
    10·1 answer
  • Which science topics would be suited for this organizational aid? Check all that apply.
    11·1 answer
  • <img src="https://tex.z-dn.net/?f=%20%5Cfrac%7Bx%7D%7B1%20%2B%20x%7D%20%20%2B%20%20%5Cfrac%7Bx%20%2B%201%7D%7Bx%7D%20%20%3D%20%2
    15·2 answers
  • I need help thanks please!
    8·2 answers
  • write a function that takes two integer arrays as input return true if any two of the numbers in the first array input add up to
    10·1 answer
  • When the binary code is retrieved from ram and moved to the cpu, this stage is known as
    8·1 answer
  • Difference between sorting and filtering​
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!