1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Liono4ka [1.6K]
3 years ago
15

You just came back to your office from a meeting about is security.​ you've learned a few things about a​ "good" password, and y

ou realize your password is inadequate. your password is thomas12211995. what is wrong with this​ password?
Computers and Technology
1 answer:
myrzilka [38]3 years ago
6 0
Hello <span>Jaelynnn7412 </span>


Question: <span>You just came back to your office from a meeting about is security.​ you've learned a few things about a​ "good" password, and you realize your password is inadequate. your password is thomas12211995. what is wrong with this​ password?
</span>
Answer: This password includes your name and also your possible date of birth.

Hope This Helps!
Chris
You might be interested in
Question Workspace Check My Work Copying computer software, video games, movies, or music without paying the producer for them i
Tcecarenko [31]

Answer:

Option B, CUSTOMER MISBEHAVIOR.

Explanation:

Consumer misbehavior can defined as the behavioral acts by consumers which violate the generally accepted norms of conduct in consumption situations, and disrupt the order expected in such situations. Misbehavior by consumers disrupts the openness, impersonal trust, and orderliness of the exchange environment.

Some of the examples of customer misbehavior are: shoplifting, bending rules, breaking rules by ignoring warnings and using products in forbidden or ways not recommended...

* Routinized response behaviour is a type of purchasing scenario whereby the purchaser of a product or a service has past experience with purchasing it and automatically makes the decision to purchase again.

* Psychological influences refers to the workings of the mind or psyche that influences customer decisions.

* Social influences refers to the intentional and unintentional efforts to change another person's beliefs, attitudes, or behavior.

Therefore, the option that best suits the question is option B, CUSTOMER MISBEHAVIOR.

3 0
4 years ago
In the context of intentional security threats, _____ can erase data and wreak havoc on computers and networks but do not replic
mihalych1998 [28]

Answer:

The answer is "Option D".

Explanation:

Trojan program is a malicious code that is also known as a virus. It is a rootkit, that aims to infect the computer to hide or obscure an object. These programs are mainly used to download additional content, such as additional pieces of malware, to the infected computer, and other options are wrong that can be defined as follows:

  • In option A, It is not correct, this option infects the system.
  • In option B, It is used for infects another computer that's why it is incorrect.
  • In option C, It is incorrect because it is used in cybersecurity.  
5 0
3 years ago
In ______ each station is assigned a code; using a special coding scheme, stations send data over the entire bandwidth of the ch
Viktor [21]

Answer:

CDMA is sa station.

Explanation:

CDMA is basically a Code Division Multiple Access .It is assgned code that facilitates the signals or special coding scheme.It optimizes the use of bandwidth, It is used in a UHF and send data over entire bandwidth of channel.It send data without sharing of capacity of channel. Its ranges is between 800 MHz and 1.9 GHz

4 0
3 years ago
You are troubleshooting network connectivity issues on a workstation. which command would you use to request new ip
xxMikexx [17]

In the scenario in which you are troubleshooting network connectivity issues on a workstation the command that you should use in order to request new IP configuration information from a DHCP server is: ipconfig/renew. This command tells your computer to renew its current IP address lease with the router.

8 0
3 years ago
Directions
DanielleElmas [232]

Answer:

is he project for me

Explanation:

3 0
2 years ago
Other questions:
  • Samantha writes technical content for a webpage and uploads it to the webpage. What should she do to ensure that the content, wh
    11·2 answers
  • What weight pencil is recommended for darkening lines and for lettering? *
    7·2 answers
  • 1.Customer service is assistance provided by a company to the people who buy or use its products or services.
    13·2 answers
  • What specific authentication method has no encryption for user credentials or data, and is not recommended for most applications
    14·1 answer
  • What does remedy mean
    7·2 answers
  • What is the output of this Python code?
    8·1 answer
  • The Freeze Panes feature would be most helpful for which situation?
    6·1 answer
  • Analog computers are general purpose computers : true ? or false ?​
    8·1 answer
  • If you are referencing cell (C2)in Excel and want to be able to copy the formula and keep using the data in cell C2 in every pla
    14·1 answer
  • in a particular factory, a team leader is an hourly paid production worker who leads a small team. in addition to hourly pay, te
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!