A cracker that tries every possible solution to crack a code is using a method known as ___________ .

Fill in the blank(s) with the appropriate word(s).


brute-force hacking.

Computer Science & Information Technology

You might also like to view...

A ________ model is based on correlations between two or more variables. ? ?

A. mean and standard deviation B. multivariate C. Markov process ? D. operational

Computer Science & Information Technology

In a transaction processing system (TPS), the _____ system is sometimes referred to as the lifeblood of an organization.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The method in the string class that returns the string in uppercase is ____.

A. StringUpper( ) B. Upper( ) C. ConvertToUpper( ) D. ToUpper( )

Computer Science & Information Technology

The expression intX ________ intY yields the remainder after intX is divided by intY.

a) Mod b) % c) * d) /

Computer Science & Information Technology