1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
disa [49]
2 years ago
6

In order to prevent unauthorized access, how can the shadow file be configured to enforce a password policy?​ What happens to ac

counts with expired passwords?
Computers and Technology
1 answer:
NemiM [27]2 years ago
4 0

Answer : The securtiy of the password can be maitained by the shadow files such as:-

  • max is for the days that represent that the same password can be used without the need for changing it  
  • min is for the days that represent waiting days before the changing of password after he/she gets a new password
  • warn are the days that come with Waring sign that the password is going to expire soon.

For a certain period of time , the user can access the log in when the password has expired . If that period is timed out then there will be no log in option and the account gets disabled.

You might be interested in
In what machines, places and apparatus are dimmers used in? Put at least 5 examples
dangina [55]

4 Types Of Dimmers :

1. Incandescent/Halogen

2. Magnetic Low Voltage (MLV)

3. Fluorescent

4. Light Emitting Diode (LED)

These are the different types of switches :

1. A single-pole switch controls lights from a single location. ...

2. A 3-way switch provides two separate control locations and is best used with recessed lights. ...

3. A 4-way switch provides for three or more dimming locations.

4. Switches are wired to the "hot" conductor in a wall box.

<em>I hope that my answer helps!</em>

7 0
3 years ago
How to code for a database?​
olganol [36]

Answer: <em><u> How to code for a database?​ A database is an organized collection of data, generally stored and accessed electronically from a computer system. Where databases are more complex they are often developed using formal design and modeling techniques. </u></em>

WWW. Wikipedia.com

Explanation: When creating a database first you need to make a software program then you need to start planing on what to do ...

{ A database management program (DBMS) is a software package design designed to manipulate, define, retrieve, and manage data in database.

A DBMS generally manipulates the data itself, the the data format, field names, record structure and file structure.}

<h3><u><em>HoPe ThIs HeLpS YoU!!</em></u></h3>

<u><em /></u>

7 0
2 years ago
Images are available in many formats, such as tif, bmp, gif, jpeg, and ____.
Lerok [7]
<span>Images are available in many formats, such as tif, bmp, gif, jpeg, and png.

</span>Hope that helps.
7 0
2 years ago
My monitor is a 60hz, and i overclocked it to 80hz. The max it will go is to 85hz, but i left it at 80hz. Will it damage my moni
Angelina_Jolie [31]

Answer:

No, It will not. but sometimes when you do the overclock the monitor may not have fast enough pixel response time. you might notice some tearing in the image. but will not do any permit damage

Explanation:

my display is overclocked from 60hz to 75hz (the max)

6 0
3 years ago
In two to four sentences, describe how you would center text.
musickatia [10]
Highlight the text , then on the home toolbar , look for a row of lines , when you hover over each it'll say what is what e.g. align left , or centre . you can also centre text by highlighting it and pressing crtl + e <span />
7 0
2 years ago
Read 2 more answers
Other questions:
  • You are asked to install a device that will combine several connections to the Internet and provide the sum of the available net
    8·2 answers
  • How assemblers and linkers work together?
    13·1 answer
  • Of the sequences listed below, which shows the correct order of the steps in the incident management workflow: (1) authenticate
    14·1 answer
  • Besides the Computer Inventory and Maintenance form, what other documentation should you keep on each computer? How might you st
    8·1 answer
  • Words that have a special meaning in a programming language are called
    13·1 answer
  • Queremos conectar una pila de 4,5 V a un diodo LED cuya tensión de trabajo es de 2 V. Calcula cuál debe ser el valor de la resis
    8·1 answer
  • What are 3 examples of a idler gear in real life?
    7·1 answer
  • Will, there be any presents this year
    15·1 answer
  • A _______ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user
    9·2 answers
  • What feature preserves your open apps and data, but allows another user to log in to his or her own session of the same computer
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!