1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Helen [10]
3 years ago
10

The system administrator in your office quits unexpectedly in the middle of the day. It's quickly apparent that he changed the s

erver password and no one knows what it is. What might you do in this type of situation?
Computers and Technology
1 answer:
Alisiya [41]3 years ago
4 0

Answer:

You should use an effective password cracker.

Explanation:

Since the system administrator decided to quit unexpectedly and apparently, he changed the server password and no one knows what it is. What you might do in this type of situation is to use an effective password cracker.

A password cracker can be defined as a software application or program used for retrieving passwords from stored locations or computer data systems. This simply means that, a password cracker is used to recover passwords in order to gain access to a computer system that is protected by authentication.

Some examples of commonly used passwords cracker are ElcomSoft, Aircrack, Hashcat, John the Ripper, Hydra, Cain and Abel, DaveGrohl, Ophcrack etc.

You might be interested in
Write a program which takes a string input, converts it to lower case, then prints the same string with all vowels (a, e, i, o,
kondor19780726 [428]

import java.util.Scanner;

public class JavaApplication66 {

   

   public static void main(String[] args) {

       Scanner scan = new Scanner(System.in);

       System.out.println("Enter String:");

       String vowels = "aeiou";

       String text = scan.nextLine();

       text = text.toLowerCase();

       String newText = "";

       

       for (int i = 0; i < text.length(); i++){

           char c = text.charAt(i);

           if (vowels.indexOf(c) == -1){

               newText += c;

           }

       }

       System.out.println(newText);

   }

   

}

This works for me. Best of luck.

8 0
3 years ago
Read 2 more answers
Assume the availability of a function is_prime. Assume a variable n has been associated with positive integer. Write the stateme
vivado [14]

Answer:

def main():

   n = int(input('Enter the value of the variable n:'))

   k=2;

   totalSum = 0

   print('The list of the prime numbers are as follows:')

   while k <= n:

       totalSum = totalSum+is_prime(k)

       k=k+1

   print('Total sum of the prime numbers:',totalSum)

def is_prime(k):

   primeNumber = 0      

   i=1

   while i<=int(k):

       if (k % i) == 0:

           primeNumber = primeNumber + 1

       i=i+1

   if(primeNumber==2):      

       print(k)

       return k;

   else:        

       return 0;

main()

Explanation:

  • Run the while loop until k is less than n.
  • Determine if the variable k is prime then add it to the totalSum variable.
  • Increment the value of k by 1.
  • Create a function isPrime to check whether the number is prime  or not by determining the factors of k which can be found using the modulus operator.
  • Call the main function at the end.

6 0
3 years ago
According to the lecture, ____________ tend to communicate about emotions, experiences and relationships.
Vlad [161]

Answer:

Woman

Explanation:

8 0
3 years ago
Read 2 more answers
Two technicians are discussing shielded cable. Technician A says that shielded wires are generally twisted in pairs to cancel th
Black_prince [1.1K]

Technician A is Correct. So this is actually a question I just had come up in my IT-140 Networking Fundamentals class but as a matter of fact I also know this because I've worked as a Network Technician for many years now both as a salaried employee and as an Independent Contractor. The reason Technician A is correct is because, indeed Wires in a Shielded Twisted-Pair (STP) cable or even Unshielded Twisted-Pair (UTP) cable are intentionally made this way for two reasons: the expressed purpose of actually twisting the wires in the first place is to protect them from interference called "EMI" (as stated in the question, Electromagnetic Interference!), however they are also twisted this way because of a similar interference (and in most cases, classified as the same kind of disturbance) called RFI or Radio Frequency Interference. As a technician, one of my jobs was hanging Access points in ceilings, and a requirement of that particular job was to make sure that these cables (which in this case were Cat6 which is short for Category 6, the exact cable that is referred to in the question, because Category 6 cable is shielded) were not to be left laying on the ceiling tiles in the drop ceilings! The reason being is, the light fixtures have electricity running through them, and anything with electricity running to it gives off Electromagnetic Interference. So, again Technician A is correct but... I have to say this as a side note... it would be <em>completely</em> pointless and utterly time consuming to remove these cables and replace them with a straight wire <u>just</u> because the warranty expired on a vehicle. Besides... Straight Though Wire and Twisted Pair are used for two completely different things.

Hope this helps! If you'd like to fact check me, google "emi interference"

CJ

3 0
4 years ago
At the monthly product meeting, one of the Product Owners proposes an idea to address an immediate shortcoming of the product sy
liberstina [14]

Answer:

Option B.

Explanation:

One of the Brand Owner suggests a suggestion at the monthly brand conference to fix an apparent weakness of the company system: to retain a copy of the consumer cost plan in the consumer records in the database. The user knows, in DynamoDB they can deal with large documents or binary objects.

Then, the user offers a conditional OK to do a Minimal Viable Product check but stipulates that even the size cap on both the Name & Value attribute must be respected. The combined value and name should not exceed 400 KB, therefore, it is the appropriate limit.

8 0
3 years ago
Other questions:
  • 1. Which is a drawback of point-and shoot cameras?
    9·1 answer
  • You are trying to appreciate how important the principle of locality is in justifying the use of a cache memory, so you experime
    11·1 answer
  • Which of the following menu commands would you select to make a copy of an open file and rename it
    14·2 answers
  • What features do you think that a smart fridge should have? Please give me a quick answer! And in detail.
    13·1 answer
  • You create a new three-way mirror storage space. You format the storage space by using ReFS. Which two features can you use on t
    13·1 answer
  • Explain how a monitor can display the letters that you type on a keyboard. (Hint: Three Basic Computer Functions) *
    11·1 answer
  • Which U.S. government agency first funded the development of the Internet?
    12·2 answers
  • If a file you are opening for appending does not exist, the operating system will detect the missing file and terminate the oper
    14·1 answer
  • The U.S. military was instrumental in the rise of the simulation training industry.
    11·1 answer
  • Use the drop-down menus to complete the sentences about the Calendar view Arrange command group.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!