1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tresset [83]
3 years ago
13

Which of the following is the strongest password? Xo795&A &cGo9Tz F5h#3u9g vU7#$3T sC9$d&cF5h#3u9g

Computers and Technology
2 answers:
SVETLANKA909090 [29]3 years ago
7 0
SC9$d&cF5h#3u9g
because it's longest and contains most type of characters.
REY [17]3 years ago
6 0

Answer:

sC9$d&cF5h#3u9g

Explanation:

     The best passwords are resistant to brute force and dictionary attacks, but you can also make them easy to remember.

    Stay away from the obvious. Never use numbers or letters in sequence and never, never even use the word password. Create unique passwords that do not include any personal information, such as your name or date of birth. If you are specifically targeted for a password hijacking, the cybercriminal will try everything he knows about you in attempts to guess your password.

    Thinking about the nature of brute force attacks, you can avoid them as follows:

   Long passwords: This is the most important factor. If possible, do not use anything shorter than 15 characters.

   Use a mix of characters: The more you mix letters, numbers, and symbols, the stronger your password will be and the harder it will be for a brute force attack to figure it out.

   Avoid common overrides: Password crackers know all common overrides. Whether it's DOORBELL or D00R8377, anyone using a brute force attack will guess it just as easily. Random character placement is much more effective today than common leetspeak * substitutions.

   Do not use memorable keyboard paths: Just as we advised above not to use letter and number sequences, do not use keyboard paths (eg qwerty). They are among the first to be discovered.

You might be interested in
This technology was developed in the 1980s and was a successful attempt to provide services for voice, video, and video traffic
sveticcg [70]

Answer:

SONET was the only one on the list created near the 1980s (1985)

Good luck!

<em>~Awwsome</em>

8 0
3 years ago
What is the first thing animators need to determine when beginning a project?
tatuchka [14]

Answer:c

Explanation:

8 0
3 years ago
The ________ view in access looks similar to an excel spreadsheet.
ch4aika [34]
Datasheet 
<span>The datasheet view in access looks similar to an excel spreadsheet.</span>
6 0
3 years ago
You are researching RAM for a computer you are building for a friend who will be using the system as a home office server for he
pashok25 [27]

Answer:

ECC RAM

Explanation:

ECC RAM is the most popular Random Access Memory out there that is used by most business servers. Dealing with big data for most huge businesses is crucial. The need to prevent loss of data requires that they purchase ECC RAM. ECC RAM automatically protects the systems from potential errors that occur in memory. Any abrupt changes in temporary data stored in ECC RAM are automatically corrected. This is achieved by an additional memory chip that acts as error detection for the other eight RAM chips.

8 0
3 years ago
1. If you have the following device like a laptop, PC and mobile phone. Choose one device
ella [17]

Answer:

For this i will use my own PC.

OS - Windows 10

Storage Capacity - 512 GBs

Memory - 16 GB

Wi-Fi - Ethernet

Installed Application - FireFox

Explanation:

An OS is the interface your computer uses.

Storage capacity is the space of your hard drive.

Memory is how much RAM (Random Access Memory) you have

Wi-Fi connectivity is for how your computer connects the the internet.

An installed application is any installed application on your computer.

3 0
3 years ago
Other questions:
  • Here's something to stop you from getting repetitive when writing essays. Write a program that reads multiple lines of plain tex
    15·1 answer
  • Given that the array monthSales of integers has already been declared and that its elements contain sales data for the 12 months
    6·1 answer
  • Someone help ASAP! Match the type of information system with its description.
    13·2 answers
  • What was the original motivation for developing the internet?
    7·1 answer
  • Green field country is planning to conduct a cricket match between two teams A and B. a large crowd is expected in the stadium a
    6·1 answer
  • Can you install Ubuntu on a hard drive by porting from the folder to the HDD?
    10·1 answer
  • This exercise shows why each pivot (in eli1nination by pivoting) must be in a different row. (a) In Example 7, make the third pi
    15·1 answer
  • The table button is present in the ……… tab.​
    14·2 answers
  • Help pweeze this is due today :(<br><br> I will give u brainliest just pweeze, I need this answer :(
    8·1 answer
  • to protect a windows 10 system, you've configured system restore to automatically protect your system using restore points. will
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!