BX Cart Rentals has created a website for customer access. They are trying to determine a reasonably secure number of available passwords. They have decided to allow upper case letters, lower case letters, digits (0 – 9), and the three pecial characters: $, ! ?. Find the number of possible 6 character passwords given each of the conditions (Note: you MUST simplify completely.) a. The password must begin with a letter (either upper or lower case) i. repetitions permitted ii. repetitions not permitted b. The password must begin with a letter and end with a special character ($, !, ?): i. repetitions permitted ii. repetitions not permitted

Question

OBX Cart Rentals has created a website for customer access. They are trying to
determine a reasonably secure number of available passwords. They have decided to
allow upper case letters, lower case letters, digits (0 – 9), and the three pecial
characters: $, ! ?. Find the number of possible 6 character passwords given each of the
conditions (Note: you MUST simplify completely.)
a. The password must begin with a letter (either upper or lower case)
i. repetitions permitted
ii. repetitions not permitted
b. The password must begin with a letter and end with a special character ($, !, ?):
i. repetitions permitted
ii. repetitions not permitted

Expert Answer

Want to see the step-by-step answer?

Check out a sample Q&A here.

Want to see this answer and more?

Experts are waiting 24/7 to provide step-by-step solutions in as fast as 30 minutes!*

*Response times may vary by subject and question complexity. Median response time is 34 minutes for paid subscribers and may be longer for promotional offers.
Tagged in
Engineering
Computer Science

Other

Related Computer Science Q&A

Find answers to questions asked by students like you.

Q: Consider the following C++ code: int* length = new int; int* height = new int; *height = 12; *le...

A: Explanation of each c++ code statement is in bold letters: Given c++ code statements with the commen...

Q: List the program file name and path for the following utilities. (Hint: You can use Explorer or a Wi...

A: a. Given: Task Manager. To find: The program file name and the path of the Task Manager Solution : ...

Q: Write a summary on how you would assign people and rands to each activity mentioned in the WBS

A: WBS is referred to as Work BreakDown Structure by which a project scope ora product scope can be dec...

Q: Prove that the language  L1 = {b^k  c^2k | k >= 0 } is not regular language with the pumping lemm...

A: The given language L1 = {bkc2k | k >= 0 } is expanded as : L1= {bcc , bbcccc, bbbcccccc , ..........

Q: 2. What challenges does a company like MobiKash face when they try to penetrate different national m...

A: Click to see the answer

Q: What is the relationship between the MULTICS project and the early development of computer security?

A: PC security essentially is the assurance of PC frameworks and data from mischief, robbery, and unapp...

Q: You are working on a project to develop a new system to help eligible students to find jobs that are...

A: Basics: Functional requirements characterize the fundamental framework conduct. Basically, these ar...

Q: Suppose that a data warehouse consists of the three dimensions time, doctor, and patient, and the tw...

A: Actually, the answer has given below:

Q: You've been called in to recommend a server for a company that's opening a new office. You're meetin...

A: Actually, the answer has given below:

Q: WRITE C++ PROGRAM IN DETAIL.QUESTION: Take input 5-Digit number from user (for example: 79862 is a 5...

A: #include<iostream> using namespace std; int main(){     int i,number1,sum=0;    int number1Arr...

Q: Recall that in regular DES, 8 bits of the initial 64-bit key are thrown away, so thatthe actual encr...

A: Data Encryption Standard (DES) The Data Encryption Standard (DES) is a symmetric-key square code dis...

Q: Create a query that displays each instructor's schedule. Display the instructor name, course title, ...

A: Actually, the answer has given below:

Q: For each of the following operations on a remote file server, discuss whether they are more likelyto...

A: Open a file. Read the contents of a file. List the contents of a directory. Display the attributes o...

Q: Two data files are required to evaluate a multiple-choice examination. The first file (booklet.dat) ...

A: PROGRAM: //Header file #include <iostream> #include <fstream>   //Using namespace using ...

Q: Write a C++ code that does the following 1) Create a link list 2)Write a function that reverses the ...

A: Objective: This program would create a linked list (single) and reverse its elements making groups o...

Q: declare ALL variables at the beginning of the program to make the program easier to read and underst...

A: #include<iostream> #include<cmath> using namespace std; int main(){     float billAmount...

Q: Write an application that asks a user to type an even number or the sentinel value 999 to stop. When...

A: Define java.util package for i/o operations Define class EvenEntryLoop Define main method taking par...

Q: 16: linkedList.cpp) Write a program in three parts. The first part should create a linked list of 26...

A: Note: Assuming three parts means three separate functions.   Programming instructions: Import neces...

Q: Hi everyone, I need help with automata, please

A: Click to see the answer

Q: 19) Define an appropriate language and formalize "There is a student who is loved by every other stu...

A:  ∃x(Student(x∧∀y.Studenty∧x=y→Loves(y,x)) it says some students are loved by every students ∃xStuden...

Q: Given the following specification, design a class diagram using PlantUML. To design the class diagra...

A: Answer-     To describe the operation of a class and its attributes class diagram are used.. Mainly ...

Q: Directions: 1. Watch video: Converting binary numbers to decimal. 2. Convert the Binary numbers belo...

A: Click to see the answer

Q: Design a class bookType that defines a book as a class. a. Each object of the class bookType will ho...

A: #include <iostream>#include <cstring>using namespace std; class bookType{private :    st...

Q: C programming

A: A required program is as follows, #include <stdio.h> #include <stdlib.h> #include <ti...

Q: you’ve been called in to recommend a server for a company that’s opening a new office. You’re meetin...

A: One of the major benefits of using the questionnaire: It maintains the privacy of the information a...

Q: Create a query that displays each instructor schedule. Display the instructor name, course title, ti...

A: Actually, the answer has given below:

Q: Write C code that contains a function called triangle_generator that outputs a triangle wave at a sp...

A: Program code: #include<stdio.h> #include<math.h> /* Prototype declaration for gensine f...

Q: Refer to the operations below:Add (10 + 5)Add (4+8)Add (7*2)Add (90 – 3)Print listPrint peekRemove a...

A: Actually, the code has given below:

Q: Solve the problem using Flowchart Algorithm

A: Step1: Input two numbers larger and smaller Step 2: while(smaller==0)               calculate remain...

Q: Print "spring" if a is equal to b, print "fall" if a is greater than b, otherwise print "break".  Us...

A: Code: a = 574b = 5 if a > b:    print("fall")elif a < b:    print("break")else:    print("spri...

Q: ***Microsoft Visual Studios (C++)***   Write a program that given two coordinate pairs and a third s...

A: #include<iostream> using namespace std; int main(){     float s1c1,s1c2,s2c1,s2c2,s3c1,s3c2,un...

Q: Create a table with activities and realistic estimated durations and develop a PERT chartusing AOA m...

A: Critical Path Analysis and PERT are powerful tools that assist to schedule and manage complex projec...

Q: 3. Write a python program to read a number and print a right triangle using E.g. : Input : 5 -Output...

A: Python program for Pyramid Printing: Patterns can be imprinted in python utilizing basic for circles...

Q: Hi, I need to answer this question using the C++ programming language. Thank you. Note: I have inclu...

A: Program description: The objective of the main.cpp file is to print users to enter length and width ...

Q: Write a program in C Write two functions product1()andproduct2( )that can multiply two integers and ...

A: EXPLANATION: - The header file stdlib needs to be included to work with files. The product1 functio...

Q: What are JAD and RAD, and how do they differ from traditional fact-finding methods? What are the mai...

A: Click to see the answer

Q: Please solve this question step by step and make it clear to understand. Please send clear picture. ...

A: M - CRYGODFORHARRY    3 18 25   7 15   4  6  15 18  8   1 18 18  25 C -  DFMQPRTYSVQBSM    4  6  14 ...

Q: USING PYTHON File Encryption and Decryption USING PYTHON Write a program that uses a dictionary to a...

A: In this program we read content of file and replace with corresponding codes from dictionary. Progra...

Q: Show how to define a view tot credits (year, num credits), giving the total numberof credits taken i...

A: SQL Query

Q: Given the following tree, implement DFS(Þepth-first Search), IDDFS(iterative Deepening Breath First ...

A: EXPLANATION: BFS: Check the starting node and add its neighbours to the queue. Mark the starting no...

Q: I have a java program that is supposed to compare the sums of the columns of a 2D array and output t...

A: The java program to find the column with maximum sum will be created as follows: Create the matrix....

Q: Best Cutting Boards (BCB) makes and sells handcrafted wood cutting boards online. BCB offers about 1...

A: An Information Technology Security Policy distinguishes the guidelines and systems for all people ge...

Q: Exercise # 2: Write a while loop that prints all positive numbers that are divisible by 10 and less ...

A: Below is the required code in C++ language. Approach of Program: Include necessary header files an...

Q: The statements Card *card1, *card2, *card3, myCard; card1 = new Card; card2 = new Card; card3 = card...

A: Object instantiation in java Instantiating means creating an instance of a specific class in java. ...

Q: CHAPTER 9 Using cardinalities shown in the partial ER diagram, name the Foreign Key(s) (FK) that sho...

A: Table Name Foreign Key Customer Table None Salesman Table None Cash Receipts Table Customer Nu...

Q: Data block to be decoded:  00 11 bc b5 49 40 b8 8d  12 00 0d fa 08 00 45 00 00 37 99 09 00 00 ff 11 ...

A: ANS: - Q1: (Layer 4) Protocol is: b8:8d:12:00:0d:fa (b8:8d:12:00:0d:fa), Dst: Cisco_b5:49:40 (00:11:...

Q: In loop functions.py, define a function named permutations that takes two paramters, n and r, in tha...

A: def permutations(n,r):    product=1;                      #store the value in a variable named produ...

Q: Payor: You are working for an insurance company and you need a database to help track your quality m...

A: Business Rule : A business rule characterizes or compels some part of business and consistently sets...

Q: Create the following queries for the “books” database. For each query make sure to only include thos...

A: SELECT COUNT(TITLE_ID) AS "# of long books" FROM TITLES WHERE TITLES.PAGES>=450 GROUP BY TYPE;

Q: Liking your tables together

A: Diagram showing Link of tables: