Create two subplots with failures versus attempts on the left, and failure rate versus
distinct usernames on the right. Draw decision boundaries for the resulting plots.
Be sure to color each data point by whether or not it is a hacker IP address.
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here