1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dsp73
2 years ago
15

Why does the use of passwords put the overall security of the network in jeopardy?

Computers and Technology
1 answer:
mash [69]2 years ago
5 0
There is only so many amounts of passwords that can be used so they can repeat and people can learn they are the same and hack youuu
You might be interested in
What is the only true way to wipe out every possibility of the virus?
const2013 [10]

Answer: Wipe it completely clean.

Explanation: The only true way to wipe out a possible virus is to wipe a computer completely clean. When you wipe the computer clean, you are starting from scratch and have a better chance of not receiving another virus moving forward.

3 0
4 years ago
A certain social media Web site allows users to post messages and to comment on other messages that have been posted. When a use
garri49 [273]

Answer:

A or S most likely (I think)

7 0
3 years ago
Hard drive access time is measured in
SIZIF [17.4K]

Answer: D) milliseconds

Explanation:

Hard drive access time are measured in milliseconds as, for the personal computer the hard drive access time is about 9 to 15 milliseconds and it basically includes the time taken for the read and write for locate the parts on the disk. As, this is the average time as it depends upon how far the head from desired.

5 0
3 years ago
A ____ is harmful computer code that spreads without your interaction, slipping from one network to another and replicating itse
blondinia [14]
Malware is the answer

3 0
4 years ago
Orphaned data is also created by the way that the hard drive allocates space on the hard drive for information that the user wan
Anika [276]
It think the answer to that question maybe true
8 0
3 years ago
Other questions:
  • - The __________ is called a single-selection statement.
    10·1 answer
  • . Does Zuckerberg believe in the thought that “the endpoint is when you sell the
    15·1 answer
  • ____________________ software is a type of security software designed to identify and neutralize web bugs, ad-serving cookies, a
    8·1 answer
  • rite a program that prompts the user to enter an integer and displays each of its numbers one by one.
    9·1 answer
  • Write a recursive function using pseudocode or C/C++.
    8·1 answer
  • Describe the three essential characteristics of an object fromthe perspective of object oriented paradigm.
    7·1 answer
  • If you ship bakudeku. I swear. <br> *RANTS*
    11·1 answer
  • Ví dụ sau sẽ in ra dữ liệu của x là kiểu gì ?
    9·1 answer
  • Gnome ____ are small programs available on the gnome panel that are designed to give you quick access to useful applications.
    14·1 answer
  • Which of the following is not a valid Java identifier? a. Factorial, b. anExtremelyLongldentifierlfYouAskMe, c. 2ndLevel, d. Iev
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!