1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nevsk [136]
2 years ago
8

Give two examples of safe, professional usernames. (1-2 sentences)

Computers and Technology
1 answer:
erastovalidia [21]2 years ago
5 0

Answer:

Safe username

Explanation:

OKNGR$#1133

PLMOKNG^&*89

You might be interested in
Which type of password would be considered secure?
Annette [7]
A strong password obeys some password rules, such as:
- minimum length
- using characters from different classes (uppercase, lowercase, numbers, typographic characters)

Your safest bet these days is to use a password manager and have it generate one for you, so that hackers can not guess it by understanding humans' predictable mind. ;-)
6 0
3 years ago
What is the purpose of installing updates on your computer?
Lostsunrise [7]

The purpose of adding updates to your computer are as follows:

  • Making sure your computer hardware can run the newest software programs
  • Ensuring the built-in virus protection software is up to date
  • Removing bugs and glitches from your operating system
  • Allowing your computer to run as fast as possible
4 0
2 years ago
Ignore this it a temporary note for me: SPSstudents
Westkost [7]

Answer:

okk

Explanation:

3 0
1 year ago
A web designer must effectively communicate when he/she designs a web page. If there is too much information to put onto one pag
valina [46]
Usually they'll add a link to the bottom of the page to the next page.

7 0
2 years ago
When TCP/IP translates a network layer address into a data link layer address, it sends a special ____________ to all computers
Llana [10]

Answer:

Broadcast message

Explanation:

The network models like OSI and TCP/IP suites have standard layers and protocols that governs the communication of end devices in a network.

The TCP/IP suite model has four layers which are application, transport, internet and network access layers. The network access does the work of both the data-link and physical layer of the OSI model.

When the packet is encapsulated in a data-link header and trailer, and needs to be sent to another unknown host, a broadcast message is sent to all the computers in the network to retrieve the remote host address for a unicast transmission to take place.

3 0
3 years ago
Read 2 more answers
Other questions:
  • Question: Henry wants to change the configuration information of an application. Which file should Henry edit to change this inf
    15·1 answer
  • Obtain a file name from the user, which will contain data pertaining to a 2D array Create a file for each of the following: aver
    5·1 answer
  • How to search for the largest files on my computer vista?
    5·1 answer
  • Stuart wants to delete some text from a slide. What should Stuart do?A. From the Review tab, choose Highlight text and then pres
    7·2 answers
  • What is the Intranet?<br>​
    5·1 answer
  • Is Missouri a free state or a slave state​
    13·2 answers
  • _____ interviews rely on scenarios and reflections to evaluate an applicant’s skill set.
    9·2 answers
  • Persuasion is when Someone speaks to crowd about love <br>○True<br>○False​
    10·1 answer
  • What is the meaning of <br>computer<br>viruses ?​
    8·1 answer
  • What is difference between base font and font tags​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!