1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tresset [83]
3 years ago
13

Which of the following is the strongest password? Xo795&A &cGo9Tz F5h#3u9g vU7#$3T sC9$d&cF5h#3u9g

Computers and Technology
2 answers:
SVETLANKA909090 [29]3 years ago
7 0
SC9$d&cF5h#3u9g
because it's longest and contains most type of characters.
REY [17]3 years ago
6 0

Answer:

sC9$d&cF5h#3u9g

Explanation:

     The best passwords are resistant to brute force and dictionary attacks, but you can also make them easy to remember.

    Stay away from the obvious. Never use numbers or letters in sequence and never, never even use the word password. Create unique passwords that do not include any personal information, such as your name or date of birth. If you are specifically targeted for a password hijacking, the cybercriminal will try everything he knows about you in attempts to guess your password.

    Thinking about the nature of brute force attacks, you can avoid them as follows:

   Long passwords: This is the most important factor. If possible, do not use anything shorter than 15 characters.

   Use a mix of characters: The more you mix letters, numbers, and symbols, the stronger your password will be and the harder it will be for a brute force attack to figure it out.

   Avoid common overrides: Password crackers know all common overrides. Whether it's DOORBELL or D00R8377, anyone using a brute force attack will guess it just as easily. Random character placement is much more effective today than common leetspeak * substitutions.

   Do not use memorable keyboard paths: Just as we advised above not to use letter and number sequences, do not use keyboard paths (eg qwerty). They are among the first to be discovered.

You might be interested in
A customer reports that recently several files cannot be accessed. The service technician decides to check the hard disk status
Lyrx [107]

Answer:

Back up the user data to removable disk

Explanation:

Before you work on a computer, especially anything that has to do with files not accessible, this might need to format the system because it might either be a virus or other forms of malware. Since backup was done to a different logical partition on the disk, the first thing to do before performing any diagnostic procedures on the disk is to back up the user data to a removable disk in order not to lose the information in the system.

8 0
2 years ago
Again, suppose that n and r denote integer values where r > 0 and n ≥ 0. What are two "simple" values, say lowEnough and tooH
enyata [817]

Answer:

Answer explained

Explanation:

From the previous question we know that while searching for n^(1/r) we don't have to look for guesses less than 0 and greater than n. Because for less than 0 it will be an imaginary number and for rth root of a non negative number can never be greater than itself. Hence lowEnough = 0 and tooHigh = n.

we need to find 5th root of 47226. The computation of root is costlier than computing power of a number. Therefore, we will look for a number whose 5th power is 47226. lowEnough = 0 and tooHigh = 47226 + 1. Question that should be asked on each step would be "Is 5th power of number < 47227?" we will stop when we find a number whose 5th power is 47226.

6 0
2 years ago
A news company is planning to use a Hardware Security Module (CloudHSM) in AWS for secure key storage of their web applications.
lakkis [162]

Answer:

you cannot obtain a new copy of the keys that you have stored on Hardware Security Module, because they are lost forever and a new copy cannot be obtained if a copy is not kept somewhere.

Explanation:

Hardware Security Module (CloudHSM) is a cloud-based hardware security module (HSM) that provides the user the opportunity to create and utilize your own encryption keys on the AWS Cloud. It is a fully managed service that takes care of time-consuming administrative activities such as software patching, backups, hardware provisioning, and high-availability for the user.

One of the key elements of the Hardware Security Module (CloudHSM) is that a copy of the keys stored must be kept somewhere because if keys are lost, they are lost forever and a new copy cannot be obtained if a copy is not kept.

Therefore, you cannot obtain a new copy of the keys that you have stored on Hardware Security Module, because they are lost forever and a new copy cannot be obtained if a copy is not kept somewhere.

5 0
2 years ago
Write a program in pascal to solve a quadratic equation
GalinKa [24]
Program p1;
var a,b,c,d : integer; {i presume you give integer numbers for the values of a, b, c }
     x1, x2 : real;
begin 
write('a='); readln(a);
write('b='); readln(b);
write('c=');readln(c);
d:=b*b - 4*a*c
if a=0 then x1=x2= - c/b
          else
if d>0 then begin 
                 x1:=(-b+sqrt(d)) / (2*a);
                 x2:=(-b - sqrt(d))/(2*a);
                end;
          else if d=0 then x1=x2= - b /(2*a)
                           else write ("no specific solution because d<0");
writeln('x1=', x1);
writeln('x2=',x2);
readln;
end.
5 0
3 years ago
Samm1E49 ok my username is mosarider489 also if others want to join u can friend me
mixer [17]

Answer:

ok

Explanation:

3 0
2 years ago
Read 2 more answers
Other questions:
  • Question: A famous Disney Movie partially takes place in this city.
    15·2 answers
  • Lisa wants to send an email with some confidential Information. Which of these options would work best for her?
    6·1 answer
  • Gap junctions and plasmodesmata have what feature in common?
    6·1 answer
  • doubleIt is a function that takes one argument and returns no value . The argument is a pointer to int . The function doubles th
    9·1 answer
  • If you're under 18 and you receive _____ or more license points in 12 months, you'll be restricted to driving only to school or
    11·1 answer
  • How can forms help us reduce data-entry errors?
    12·1 answer
  • A spreadsheet contains the maximum weight and maximum height for fifty dog breeds. The breeds are located in rows, and the weigh
    5·1 answer
  • Which term describes a visual object such as a picture, a table, or a text box?
    14·2 answers
  • marianne needs to create a version of her slide presentation that does not include all the slides and will be used for a particu
    9·1 answer
  • Why is the song Twinkle Twinkle Little Star an example of ternary form?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!