1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Veseljchak [2.6K]
3 years ago
11

How would a password be a good password, how, and why.

Computers and Technology
2 answers:
AlladinOne [14]3 years ago
7 0

Answer:

the password needs to have a mix of symbols,letters, and numbers

because then no one can break into your private information or account

Pachacha [2.7K]3 years ago
4 0

Answer:

Complicated

Explanation:

A good password is something that can't just be guessed like cupcake it has to be like CUp_c3k3_456

You might be interested in
Why might it be important to be careful when placing multiple microphones around the same sound source
Softa [21]

Answer:

I think you can get mic feedback from all of the microphones

Explanation:

Let me know if this is the answer you are looking for

8 0
3 years ago
Define binary number and decimal number with example​
photoshop1234 [79]

Answer:

The Decimal Number System is a number system for which every real number x can be written in terms of the ten digits 0, 1, 2, 3, 4, 5, 6, 7, 8, and 9 as the sum of powers of 10. A number in the decimal number system is said to be of base 10 and to specify this we attach a subscript 10 to x, written (x)10.

The Binary Number System is a number system for which every real number x can be written in terms of the two digits 0 and 1 as the sum of powers of 2. A number written in the binary number system is said to be of base 2, and to specify this we attach a subscript 2 to x, written (x)2.

4 0
3 years ago
Which similar computer network components connect multiple devices?
Firlakuza [10]
That computer network component is router. It's possible to connect printer to it. Other computer and any other devices.
8 0
4 years ago
Please use thread to complete the following program: one process opens a file data.txt, then creates a thread my_thread. The job
Firlakuza [10]

Answer:

Here is the code:-

//include the required header files

#include<stdio.h>

#include<pthread.h>

// method protocol definition

void *count_lines(void *arg);

int main()

{

    // Create a thread handler

    pthread_t my_thread;

    // Create a file handler

    FILE *fh;

    // declare the variable

    int *linecnt;

    // open the data file

    fh=fopen("data.txt","r");

// Create a thread using pthread_create; pass fh to my_thread;

    pthread_create(&my_thread, NULL, count_lines, (void*)fh);

    //Use pthread_join to terminate the thread my_thread

    pthread_join( my_thread, (void**)&linecnt );

    // print the number of lines

printf("\nNumber of lines in the given file: %d \n\n", linecnt);

    return (0);

}

// Method to count the number of lines

void *count_lines(void *arg)

{

    // variable declaration and initialization

    int linecnt=-1;

    char TTline[1600];

    //code to count the number of lines

    while(!feof(arg))

    {

         fgets(TTline,1600,arg);

         linecnt++;

    }

    pthread_exit((void *)linecnt);

    // close the file handler

    fclose(arg);

}

Explanation:

Program:-

8 0
3 years ago
All of these issues are results of data integrity problems except ________.
Dvinal [7]

If there is an issue with the integrity of data the only one that will not be an issue is; The system will give users too much information.

<h3>What is Data Security?</h3>

Data Security is defined as a security service that deals with identifying any alteration to the data. This is as a result of the data getting modified by an unauthorized entity either intentionally or accidentally.

Now, data security is also called data integrity is simply the safety of data and from the options given if there is an issue with the integrity of data the only one that will not be an issue is  the system will give users too much information. because it is not a function of breach of data security.

Read more about data security at; brainly.com/question/4688296

8 0
3 years ago
Other questions:
  • Type the correct answer in the box.
    7·1 answer
  • What type of rain happens when cold air meets warm air
    14·1 answer
  • An Internet connection problem for customers is found to be outside a carrier's regional office. As a result, which area needs t
    9·1 answer
  • What are programming paradigms?​
    9·1 answer
  • What is good prossesser
    15·2 answers
  • Bluetooth 5 allows data to be transferred between two devices at a rate of
    8·1 answer
  • TLE(ICT)-10
    10·1 answer
  • In a program you need to store identification numbers of 5 employees and their weekly gross pay.
    11·1 answer
  • Create a class RightTriangle which implements the API exactly as described in the following JavadocLinks to an external site..
    11·1 answer
  • In the context of in-house software development options, a firm that enhances a commercial package by adding custom features and
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!