what is a password attack?

Answers

Answer 1

Answer:

A password attack is exactly what it sounds like: a third party trying to gain access to your systems by cracking a user's password.

Answer 2

Answer:

A hacker trying to hack into your accounts/systems by cracking your password.


Related Questions

Provides an array of buttons for quick access to commonly used commands and tools

A. scroll bar

B. tool bar

C. status bar

D. menu bar

Answers

Answer:Tool bar

Explanation:

The toolbar is said to provide an array of buttons for quick access to commonly used commands and tools. Through the toolbar, one can easily access the commands that are commonly used.

We can see the toolbar in several software like the graphics editor, office suites, and browsers.

The answer is B. Tool Bar!

list three rational number between-1 and 1​

Answers

Answer:3 numbers are -0.9  0.25 0.26

Explanation:

Answer:

oh god heartburn oh wait wrong question

Explanation:

What is one ethical use of technology?

A.
Arguing with people on Twitter about various topics.

B.
Browsing the internet on your smartphone during class.

C.
Posting fake information on your social media accounts.

D.
Talking to friends and colleagues about interesting news.

Answers

Answer:

D.

Talking to friends and colleagues about interesting news.

Explanation:

Ethics is a branch of philosophy that "involves systematizing, defending, and recommending concepts of right and wrong behavior". So if something is "ethical" it is a right thing to do.

Definitely D
hope this helps :)

How do you find the Layout dialog box for changing the layout options of an image in a Word document? Use the
drop-down menus to complete the steps.
1
2. Click the
3. Click
4. Click
at the bottom of the pop-up menu.

Answers

Answer:

1. Select the image

2. Format tab

3. the position button

4. more layout options

Explanation:

Answer:

How do you find the Layout dialog box for changing the layout options of an image in a Word document? Use the drop-down menus to complete the steps.

1.  ✔ Select the image (C)  

2.  Click the  ✔ Format tab (B)  

3.  Click  ✔ the Position button (B)

4.  Click ✔ More Layout Options (A) at the bottom of the pop-up menu.

Explanation:

Doing it on EDG right now!

Good luck and have a good day :)

Overview Write a program that reads an integer from the user and then prints the Hailstone sequence starting from that number "What is the hailstone sequence?" you might ask. Well, there are two rules: • If n is even, then divide it by 2 • If n is odd, then multiply it by 3 and add 1 Continue this sequence until you hit the number 1.​

Answers

n=int(input("Enter number: "))

while n != 1:

   print(n)

   if n%2==0:

       n//= 2

   else:

       n = (n*3)+1

print(n)

I wrote my code in python 3.8. If you want to print the 1, keep the last line of code otherwise delete it.

Propose a list of five milestones that would be reasonable in a mid-project prototype phase of a video game development project (any genre).

Answers

Answer:

Five milestones of a game development process are prototype, vertical slice, pre-alpha, alpha, and beta.

Explanation:

Game development is the process of creating or producing a functional bug-free game. The development process hits several milestones throughout its three stages or processes. These milestones are prototype, vertical slice, pre-alpha, alpha, beta, and gold master.

When you send large attachments, you are not
a. considering the needs of others
b. doing anything wrong
c. helping to maintain respectful communication
d. following social conventions
Please select the best answer from the choices provided
A
ОО
B
ОС

Answers

Answer:

c,becauses she is helping

Explanation:

thank me later

Answer:

A

Explanation:

i got a 100

Approximately how many tweets are posted on Twitter each day? 500 500 thousand 500 million 500 billion

Answers

Answer:

around 500 million

Explanation:


Can I control my digital footprint?



Answers

Answer:

yes you can

Explanation:

Answer:

Yes you can

Explanation:

1. Enter your name into several search engines.

2. Double check your privacy settings, but don't trust them.

3. Create strong, memorable passwords.

4. Keep all your software up to date.

5. Review your mobile use.

6. Build your reputation through your behavior.

Which of these is an example of a system?

a circle

force

a single particle of matter

scissors

Answers

Answer:

force and a single particla of matter

If tech is smarter than us. How did a human make something smarter than him/her?

Answers

Answer:

hey eliza you there

Explanation:

Answer:

Well, really we are the smart ones since we created it and we put all of the info inside of that robot

Explanation:

A person interested in a career in digital media should have which qualities? Select all that apply.


1. creativity

2. leadership

3. attention to detail

4. forcefulness

5. enjoyment in learning new things

6. vision

Thank you!!!

Answers

1.Creativity
2.Leadership
3.Attention to detail
5.Enjoyment to learning new things!
6.Vision
No Problem!

Erin would like to add a photo to a presentation. However, she only has the printed copy of the photo. She does not have a digital copy. What should Erin do?

Answers

Answer:

Erin should scan the photo.

Took it on Edge <3

Answer:

Erin should scan the photo.

Explanation:

That´s what I thought :)

WILL MARK BRIAN PLZ HELP PLZ I BEG YOU While levels often change in order to give a game some more variability, they might also change to tell more of the what?

Group of answer choices


game creation process


instructions


game story


animation

Answers

Answer:

Game story

Explanation:

Answer:

Game Story

Explanation:

I really need help please :)

Answers

I'm sorry I don't know question 6, but question 5 is B. Who love

Zareen used a school computer to create a fake
website where she posted pictures and rude
comments about her former friend.
What consequences could she face from school
officials for her actions? Check all that apply.
She could have her technology privileges taken
away.
She could face a severe financial penalty.
She could spend time in a juvenile detention facility.
She could face detention or suspension.
O She could be forbidden from attending school social
events.
She could be denied access to certain websites.

Answers

Answer: She could have her technology privileges taken away, She could face detention or suspension, She could be forbidden from attending school social events, She could be denied access to certain websites.

Explanation: ADEF on Edge 2021

The  consequences could Zareen  face from school are-

She could have her technology privileges taken away.She could be denied access to certain websites.She could face detention or suspension.What is a computer?

A computer is referred to as an electronic device that is used to perform arithmetic and logical operations quickly and accurately without causing any error in the result.

In the given case, it is explained that A girl named Zareen used a school computer to post comments inappropriate and rude comments about her former friend by creating a fake website.

This shows that Zareen has violated someone's personal privacy which can result in severe actions against her so the school may restrict her to use this kind of website.

As she disturbs someone's personal or social image it can cause her with suspension from school. The school may restrict her to use any kind of technology due to her immature and rude behavior.

Learn more about computers, here:

https://brainly.com/question/1380748

#SPJ5

The symbol is used to indicate that a line of text is a comment.

Answers

Answer:

Explanation:

asterisk

Answer:

# is the symbol you would use

Explanation:

I took the Unit Test on Edgen.

Rachel has set up a computer network. In this network, due to a device, the computers partake in the message transfer process. Which device is this? A. NIC B. hub C. modem D. switch E. bridge

Answers

Answer:

B. hub

Explanation:

Hub is a device that connects two or more computers together to make a Local Area Connection (LAN). It receives message and sends it to every computer on the network through a hub cables plugged into it from each computer. It enables each individual computer to partake in the message transfer process and each users can listen to the information. It is typically used at the centre of a star network and it is mostly regarded as an unsecured network.

Answer:

b

Explanation:

the function of television

Answers

Answer:

Explanation:

it's to provide information and entertainment to the masses at a reasonable price.

Select the correct answer.
Which of these factors can be created as a physical model?
OA
a next-generation car
OB.
software code
OC. website address
OD.
conversion of energy
O E knowledge of a product

Answers

A. a next generation car

Ugh these are hard questions

Answers

9 is B, and 10 is D I think ... brainliest pls

How will you define a text?

Answers

Answer:

Text refers to content rather than form; for example, if you were talking about the text of "Don Quixote," you would be referring to the words in the book, not the physical book itself. Information related to a text, and often printed alongside it—such as an author's name, the publisher, the date of publication, etc.—is known as paratext.

The idea of what constitutes a text has evolved over time. In recent years, the dynamics of technology—especially social media—have expanded the notion of the text to include symbols such as emoticons and emojis. A sociologist studying teenage communication, for example, might refer to texts that combine traditional language and graphic symbols.

Explanation:

I Hope it help

Rachel has set up a computer network. In this network, due to a device, the computers partake in the message transfer process. Which device is
this?
А. NIC
В. hub
C. modem
D. switch
E. bridge

Answers

it’s a modem which is like a router

When inserting a comment in a cell, the command on the Review tab is New Comment, but if you right-click in the cell,
what command would you choose from the shortcut menu?

A.)New Comment

B)Insert Comment

C)Review Comment

D)Add Comment

Answers

Answer:

B) Insert Comment

Explanation:

Generally, workbooks are known as Microsoft Excel files. Excel workbook can be defined as a collection of one or more charts and worksheets (spreadsheets) used for data entry and storage in an excel file. In order to create a project on Excel you will have to use a workbook.

A spreadsheet can be defined as a file or document which comprises of cells in a tabulated format (rows and columns) typically used for formatting, arranging, analyzing, storing, calculating and sorting data on computer software applications such as Microsoft Excel.

When inserting a comment in a cell, the command on the Review tab is New Comment, but if you right-click in the cell, the command you would choose from the shortcut menu is Insert Comment. The shortcut key for Insert Comment is "Shift+F2."

The image shows a bar graph.

A bar graph shows a series of 4 vertical bars along an x and y axis.

In which scenarios would using this graph be best for a presentation? Check all that apply.

showing change in a community’s average median age over a century
comparing the percentages of the types of pets owned in a community
showing how the world’s shark population has changed over 50 years
comparing the number of men and women who earned engineering degrees in a decade
showing the percentages of the various religions practiced in Indonesia

Answers

Answer:

showing change in a community’s average median age over a century

showing how the world’s shark population has changed over 50 years.

comparing the number of men and women who earned engineering degrees in a decade

Explanation:

2. Read the following scenarios about how three different programmera approach
programming a computer game. Identify which type of programming design
approach each represents (3 points):
a) Yolanda first breaks down the whole game she needs to program into modules.
She then breaks these modules into smaller modules until the individual parts are
manageable for programming. She writes the smallest modules, and then
recombines them into larger parts.
b) Isabella takes the game process and groups together sets of related data involved
in the process. She then identifies the messages the data should respond to. After
writing the code for each set of data, Isabella then combines, tests, and refines the
subsets until the software runs properly

Answers

a.) Structured programming

b.) Object-oriented programming

c.) Top-down programming

The programming design approach represented in this scenario is modular programming. The programming design approach represented in this scenario is object-oriented programming.

What is programming?

The process of creating a set of instructions that tells a computer how to perform a task is known as programming.

Computer programming languages such as JavaScript, Python, and C++ can be used to create programs.

Modular programming is the programming design approach represented in this scenario.

Yolanda divides the entire game into modules, which are then subdivided further into smaller modules until the individual parts are manageable for programming.

Object-oriented programming is the programming design approach represented in this scenario. Isabella organizes sets of related data and determines which messages the data should respond to.

Thus, this method entails representing data and functions as objects and employing inheritance and polymorphism to generate flexible and reusable code.

For more details regarding programming, visit:

https://brainly.com/question/11023419

#SPJ2

What are the types of text?

Answers

Answer: there are two main text types, factual and literary. Within these are many more narrowly defined text types. Factual text types include such types as factual description, recount, or persuasive. Literary text types include such types as poetry, narrative or personal response.

Answer:

Description sequeninstruction process cause-and-effect compare contrast problem and solution

Explanation:

there just soooo many types of texts bit theses are sum

Binary to Denary
11101111=

1111111=

Answers

Answer:

1110111= 239

1111111=127

Explanation:

The method is 1 ,2 ,4 ,8 16, 32 ,64 let me know if this helped g

17. What is something an employer might look for in person when hiring? (3
points)
A. Someone with a positive attitude
B. Someone with positive qualities such as honesty, tolerance, and
patience
C. Someone easy to work with
D. All of the above

Answers

D. all of the above
D. All the above

Why? Since all these qualities are valuable when hiring someone, you want them to be polite and respectful. It will also make working with this person better since you won’t have to deal with some rude or nasty.

Answers are 1-11, 3 is wrong

Answers

Answer:is the python

Explanation:

Use repl .it

The answer is 4

1:
3+2=5
2:
5+2=7
3:
7+2=9
4:
9+2=11
It would stop here as 11 is bigger than 10
Other Questions
True or false: in our solar system, only the sun creates radio waves Which statements best describe characteristics of medieval art, literature, and science? Choose four correctanswers What is 6/87 of 45638??????? How would I prove KM = HM?Given that GJ is the perp bisector of HK Which process is caused by natural selection?A.Evolution of populationsB.Population growthC.Genetic mutationD.Reproduction of individuals The study of how the body uses food. A.) nutrients B.)food preparation C.)nutrition D.) metabolism help me, 2+4 3 4+(29) When you are able to feel and touch product, it is called I need help on this questionIf someone could help me please and thank you! when mrs white first noticed a stranger outside he was What are the like terms in the following algebraic expression? 5 - 3y + 2x - 5y + x - 2 + 3x^2 What book did the priests read ( ancient India ) PLEASE ANSWER I PUT THE MAX POINTS I COULD Jayla has 500 stickers in a collection. She wants at least y stickers in her collection at the end of the month. She buys 25 stickers each day. Write an inequality thanumber of days. Enter your answer in the box provided. Decide if the following sentence is grammatically CORRECT or INCORRECT.Er ist keinen Polizist. CorrectIncorrect Which of the following was NOT included atthe federal level of government under theArticles of Confederation?A. A President of the United StatesB. State RightsC. The CongressD. State-controlled trade How many moles of HO can be produced when 5.5 moles of CO is produced? CH + 3 O --> 2 CO + 2 HO Help pls 6th grade math HELP ME PLEASE!!! I DON'T UNDERSTAND! Divide. Reduce the answer to lowest terms. 2/7 15/7 (GIVING BRAINLIEST!!)Which type of precipitation is most likely to occur when both air and cloud temperatures are above freezing?A) RainB) SnowC) HailD) Sleet