1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Veseljchak [2.6K]
3 years ago
11

How would a password be a good password, how, and why.

Computers and Technology
2 answers:
AlladinOne [14]3 years ago
7 0

Answer:

the password needs to have a mix of symbols,letters, and numbers

because then no one can break into your private information or account

Pachacha [2.7K]3 years ago
4 0

Answer:

Complicated

Explanation:

A good password is something that can't just be guessed like cupcake it has to be like CUp_c3k3_456

You might be interested in
In attempts to improve their contribution to the environment, a company decided to adapt to green computing. Which of these tech
timama [110]

Answer:

All of them apply

Explanation:

Green computing is the process of using environmental friendly computers and its associated components, accessories and other supporting devices.

Virtualization helps us to reduce the number of hardware that we are using.

Grid computers helps us to reduce the use of number of machines and thus supporting the environment in a right way.

Recycling process. Any material that we use needs to be recycled effectively and also in an environmental friendly way.

Autonomic computing uses eco-friendly system which in turn hugely support green computing.

8 0
3 years ago
Which factors have increased the need for the latest cybersecurity technologies?
coldgirl [10]

The factors have increased the need for the latest cybersecurity technologies are A. smaller targets, C. customized threats.

<h3>What are the cybersecurity?</h3>

Cybersecurity is the safety of internet-related structures which include hardware, software program and records from cyber threats. The exercise is utilized by people and organizations to defend towards unauthorized get admission to to records facilities and different automated structures.

Cyberattacks can goal a huge variety of sufferers from character customers to organizations or maybe governments. When focused on groups or different organizations, the hacker's aim is normally to get admission to touchy and precious enterprise resources, which include highbrow property (IP), client records or price details.

Read more about the cybersecurity technologies:

brainly.com/question/26260220

#SPJ1

7 0
2 years ago
Steps for turning off 2 step verification on iPhones
jeka94
If it’s for the App Store, follow this
Settings > ITunes & Apple Store > Password Settings > Turn off require password by pressing the swipe button thing. I’m sorry if this doesn’t help
6 0
3 years ago
A Software Developer wants to add a new feature to an existing application operating in the Cloud, but only wants to pay for the
Mamont248 [21]

A term which describes this feature of cloud computing is: C. serverless computing.

<h3>The features of cloud computing.</h3>

In Computer technology, the features of cloud computing include the following:

  • Elasticity
  • Pooled resources
  • On-Demand self-service
  • Multitenancy
  • Serverless computing

In Cloud computing, serverless computing is a feature that is typically used to add a new feature to an existing software application that is operating in the Cloud while having to pay only for the computing time which the software code actually uses when it is called.

Read more on cloud computing here: brainly.com/question/19057393

#SPJ1

8 0
2 years ago
Read 2 more answers
The clearest way to start a formal business document is with a
11111nata11111 [884]

Answer:

bottom line statement

Explanation:

The bottom-line statement is a solid, clear and effective starting point to use at the beginning of a formal business document.

3 0
3 years ago
Other questions:
  • The calls radioed to patrol officers, or assignments given to police patrol units by 911 dispatchers, reveal the types of proble
    9·1 answer
  • Intel® Core™ i5-7500 is one of Intel's 7th generation of microprocessors and was launched earlier in 2017 and has been used in m
    13·1 answer
  • Which of the following correctly describes the function of an IP address
    13·1 answer
  • What is the name of the symbol that is used to classify and categorize information?​
    10·2 answers
  • _____ remove the part of an image starting from an edge​
    13·1 answer
  • man who is colorblind marries a woman who has normal color vision and is not a carrier of color blindness. If this couple has a
    15·1 answer
  • You buy a new workstation that features an embedded RAID controller on the motherboard. You want to setup hardware RAID 10. How
    10·2 answers
  • Write a line of code to convert time to hours. Remember there are 60 minutes in an hour. Then write a line of code to calculate
    9·2 answers
  • A coffee shop is considering accepting orders and payments through their phone app and have decided to use public key encryption
    10·1 answer
  • Which of the following is the key business objective behind the technologies implemented by PCL Construction, as discussed in th
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!