A __________ is a password guessing program.
A. password hash B. password cracker
C. password biometric D. password salt
B. password cracker
Computer Science & Information Technology
You might also like to view...
You cannot create an object using a/an:
(a) superclass constructor (b) subclass constructor (c) ancestor class constructor (d) abstract class constructor
Computer Science & Information Technology
To uncompress a file compressed with the gzip utility, you use the ____ command.
A. gunzip B. unzip C. bunzip D. gunzip2
Computer Science & Information Technology
The ________ works within the network to determine where data from another network should go
A) packet B) wireless router C) router D) switch
Computer Science & Information Technology
You can correct the appearance of a shape tween using shape ____.
A. patterns B. hints C. clicks D. tags
Computer Science & Information Technology