subject
Computers and Technology, 24.06.2021 01:00 zara76

Suppose a computer's login mechanism first asks for a user name, and rejects the login if the name is not one of those in its password file. If the login name is in the password file, then the system prompts for the password, and admits the user to the system if (and only if) the password is correct. Henrietta the Hacker has a list of 10,000 commonly used login names, and a list of 100,000 commonly used passwords. On this computer, there are 100 accounts that have both a login name on the first list and a password on the second list. For simplicity, assume that no other accounts have either a login name or password on these lists. Henrietta has written code that can attempt 1000 logins per second on this computer. This program repeatedly chooses a random login name from the first list, until it finds one that is not rejected. It then repeatedly and randomly picks a password from the second list and uses it in conjunction with the found login name.

Required:
Compute the expected number of seconds it will take Henrietta to break into some account on the machine.

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 19:20
Terri needs to insert a cover page into her document. where should she go to access the commands to do so? o insert tab, objects group o insert tab, illustrations group o insert tab, pages group o insert tab, media group submit
Answers: 1
question
Computers and Technology, 22.06.2019 22:30
The qwerty keyboard is the most common layout of keys on a keyboard
Answers: 3
question
Computers and Technology, 24.06.2019 05:50
What all vehicles has tesla inc. created over the years
Answers: 3
question
Computers and Technology, 25.06.2019 02:00
Software and services are used to conceive, plan, and execute projects in any field. these tools are excellent methods of increasing the probability of successful projects. open source linux project management mind-mapping
Answers: 2
You know the right answer?
Suppose a computer's login mechanism first asks for a user name, and rejects the login if the name i...
Questions
question
Biology, 18.09.2019 15:30
Questions on the website: 13722363