1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
const2013 [10]
2 years ago
5

Microsoft recommends when that you create passwords with upper and lowercase letters, numbers, symbols, and use at least _______

_ characters.
Computers and Technology
1 answer:
harkovskaia [24]2 years ago
4 0

Answer: 8 characters

Explanation:

You might be interested in
How should the administrator enable users with permissions to use einstein analytics features
wariber [46]

Answer:

Einstein analytics plus user

Explanation:

Einstein data insights is a platform that can be used by a company to analyse Salesforce report. With a subscription to this platform, an administrator can grant limited access to users in the company and monitor the logs and reports.

To grant a user access to Einstein data insights, go to setup and find permission set on the quick find box, on the "permission set", click on "einstein analytics plus user", then click on "manage assignment | add assignment". Add the users you want and then click on "assign".

4 0
3 years ago
You have important data on your hard drive that is not backed up and your Windows installation is so corrupted you know that you
love history [14]

Answer:

Make every attempt to recover the data

Explanation:

If your decide to format the drive, use system restore or reinstall the windows OS you may end up loosing all your data so the best option is to try as much as you can attempting to recover the data because the data might or definitely will be lost while using other options you think are available.

8 0
2 years ago
Remote authentication has always been a concern because the person is coming from a public network, and many companies require t
g100num [7]

Answer:

Incomplete Question.

I'll answer this question based on general terms

Explanation:

Two Factor Authentication, abbreviated as 2FA.

It is a type of authentication that requires the presentation of two credentials for access to personal data and information.

The credentials needed for a 2FA are

1. Either of the following; PIN, Password or Pattern

2. Your device or gadget which could be an ATM Card, Mobile Phone

3. Biometrics such as fingerprint, voice input

Number one is often referred to as "Something you know"

Number two is referred to as "Something you have"

Number three is referred to as "Something you are"

The 2FA doesn't require the three aforementioned credentials. It only needs just two of the credentials to provide its authentication.

8 0
3 years ago
Read 2 more answers
Windows server 2012 r2 supports two types of folder shares. what are those two types?
larisa [96]
<span>Windows server 2012 r2 supports the following two types of folder shares: </span>Network File System and Server Message Blocks. Correct answer: D
Network File System<span> (</span>NFS) is a distributed file system protocol for <span>storing and updating files on a remote computer. </span>
The Server Message Block<span> (SMB) Protocol is a </span>network file sharing protocol.
7 0
3 years ago
What is the relationship between CAD and CIM ?
Marat540 [252]
<span> CAM( computerised Aided Manufacture) is when you have workers being helped by computerised tools, CIM (computerised intergated manufacture) is when the whole process is computerised, in manufacture this usually uses robotic arms. These can manufacture 24/7 in needed, they can work very accurately ( they are faster and stronger than a human arm) </span>
5 0
3 years ago
Read 2 more answers
Other questions:
  • If you print a document with red green or blue underlines will they show up on printed pages
    14·1 answer
  • What would be one advantage and one risk of using an electric car?
    14·2 answers
  • Why is it not advisable to mark tlc plates with a pen to indicate?
    12·1 answer
  • All of the nested folders you created will carry the same permissions as the __________ until you make changes.
    10·1 answer
  • What is Groovefunnels?
    10·2 answers
  • In a PivotTable, how can a field of data be hidden from the viewer but still be active in calculations made by Excel’s formulas?
    11·1 answer
  • Why computer process faster than humans?​
    10·2 answers
  • Write bash script which takes array as an input of size 10 bind its even indexes to accept even values and odd indexes to accept
    5·1 answer
  • Switched backbone networks:_____.a. always use a ring topology.b. require much more management that do routed backbone networks.
    10·1 answer
  • State the base of correct addition of 27 + 6 =34​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!