Using a database of precomputed hashes from sequentially calculated passwords called a rainbow table, an attacker can simply look up a hashed password and read out the text version. Each column in the rainbow table uses a different reduction function. The function of the table is <span>reversing cryptographic hash functions. </span>
Two approaches are:
Echo $$
Ps
Answer:
keys in a worst case scenario
Explanation:
So, Average will be : 
(Answer)