subject

Suppose a computer's login mechanism first asks for a user name, and then for the password, regardless of whether or not the login name is that of a valid user. Herman the Hacker has a list of 10,000 commonly used login names, and a list of 100,000 commonly used passwords. On this computer, there are 100 accounts that have both a login name on the first list and a password on the second list. For simplicity, assume that no other accounts have either a login name or password on these lists. Herman has written code that can attempt 1000 logins per second on this computer. This program repeatedly chooses a random login name from the first list and a random password from the second list. Compute the expected number of seconds it will take Herman to break into some account on the machine, and identify that number from the list below.
Hint: Since names and passwords are chosen randomly, repetitions are possible. It may indeed be easier to forget what names/passwords have been tried than to keep a list of what has been tried and avoid duplicate attempts. As a result, there is an easy formula for the expected number of tries. If the probability of success on any given try is p, then the expected number of tries until the first success is exactly 1/p.
A. 1.1
B. 100.1
C. 10,000
D. 1000.1

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 23:30
Define a function printfeetinchshort, with int parameters numfeet and numinches, that prints using ' and " shorthand. ex: printfeetinchshort(5, 8) prints: 5' 8"
Answers: 1
question
Computers and Technology, 23.06.2019 01:10
Are special combinations of keys that tell a computer to perform a command. keypads multi-keys combinations shortcuts
Answers: 1
question
Computers and Technology, 24.06.2019 04:30
1. web and mobile applications allow users to be actively engaged in an online activity. a true b false 2. some examples of business applications purposes are to collaborate, share files, meet virtually in real-time, and accept payments. a true b false 3. an education application would most likely do which of the following? a allow users to watch popular movies and tv shows b connect users with social and business contacts c confirm users' travel plans d teach users a new language 4. a uniform resource locator (url) is how the internet knows where to take users when an address is typed into a browser. a true b false 5. deon is required to provide the citation information for his sources. what type of information should he collect from his sources? a author name, title, date of publication, date of access, url b connections to background information c interesting facts and statistics d notes on important information
Answers: 1
question
Computers and Technology, 24.06.2019 14:00
When creating a field in a table, you must set the to determine what type of data the field can store. field property data type field type data property
Answers: 1
You know the right answer?
Suppose a computer's login mechanism first asks for a user name, and then for the password, regardle...
Questions
question
Physics, 12.12.2020 16:50
question
Mathematics, 12.12.2020 16:50
question
Mathematics, 12.12.2020 16:50
Questions on the website: 13722361