1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dovator [93]
3 years ago
14

We investigated a program which is probably used as one component of a bigger password breaking algorithm. We determined that th

e program can input arbitrary N-bit queue and for actual N-bit input also the program output will be always N bits long. Additionally we noticed that the longer program input is, the longer will be the output calculating time. After performing some repeating tests we also determined that the program working time depends only and exactly on input length, not on the input itself.
Finally we fixed some actual working times:



-for N=10 - 10.576 seconds;

-for N=20 - 11.087 seconds;

-for N=25 - 13.544 seconds;

-for N=30 - 27.442 seconds;

-for N=35 - 1 minute 46.059 seconds;

-for N=40 - 9 minutes 10.784 seconds.



Task:



a) Find the program working time for N=50.

b) Please derive the mathematical formula using which is possible to calculate actual working time for arbitrary N.
Computers and Technology
1 answer:
Svetlanka [38]3 years ago
3 0

Answer:

i dont know

Explanation:

You might be interested in
What should you do before cleaning the top of a storage battery and rinsing it with fresh water?
Montano1993 [528]
D. Discharge the battery completely
6 0
3 years ago
Which is an operational process performed by AWS for data security? a.Background virus scans of EBS volumes and EBS snapshots
Tresset [83]

Answer:

B. All decommissioned magnetic storage devices are degaussed and physically destroyed in accordance with industry-standard practices.

Explanation:

6 0
3 years ago
Which step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs? maintain access gain a
jenyasd209 [6]

The step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs is option a: maintain access.

<h3>What is maintaining access in penetration testing?</h3>

“Maintaining Access” is a stage of the  penetration testing life cycle and it is said to have a real purpose.

It is one that tends to allow the pentester to stay in the set systems until he get the information he need that is  valuable and then manages to take it successfully from the system.

Hence, The step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs is option a: maintain access.

Learn more about penetration testing  from

brainly.com/question/26555003

#SPJ1

7 0
2 years ago
"what is the common information listed under the ip section of pdu details as compared to the information listed under the osi m
frez [133]

Solution:

The common information listed under the ip section of pdu details as compared to the information listed under the osi model tab is Packet Tracer.

This simulation activity is intended to provide a foundation for understanding the TCP/IP protocol suite and the relationship to the OSI model. Simulation mode allows you to view the data contents being sent across the network at each layer. As data moves through the network, it is broken down into smaller pieces and identified so that the pieces can be put back together when they arrive at the destination. Each piece is assigned a specific name (protocol data unit [PDU]) and associated with a specific layer of the TCP/IP and OSI models. Packet Tracer simulation mode enables you to view each of the layers and the associated PDU. The following steps lead the user through the process of requesting a web page from a web server by using the web browser application available on a client PC.  Even though much of the information displayed will be discussed in more detail later, this is an opportunity to explore the functionality of Packet Tracer and be able to visualize the encapsulation process.

This is the required answer.

7 0
3 years ago
You are an IT technician for a small computer store. You are designing a new gaming PC for a customer. You need to ensure that i
Andrews [41]

Answer:

all options

a, b and c the most important

Explanation:

6 0
3 years ago
Other questions:
  • The term used to describe an electronic device, operating under the control of instructions stored in its own memory, that can a
    7·1 answer
  • Why are video texts an example of multimedia? A. They use audio and visual elements together. B. They use one type of medium to
    13·2 answers
  • Where would you look to see how much space is available on your c drive?
    8·1 answer
  • You notice your glove is torn; what should you do
    14·2 answers
  • Georgenotfound??? question mark??
    15·2 answers
  • If Asa changes the text to bold, he has changed the style. True False
    8·2 answers
  • explain the following with regard to a microcomputer. 1)program 2)stored program concept 3)instruction decoder
    5·1 answer
  • Why is it a good idea to defrag your hard disk regularly?
    9·1 answer
  • What is the function of the NOS? Select all that apply.
    5·2 answers
  • How can you make a search phrase more effective?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!