1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katrin2010 [14]
4 years ago
15

You would set a ___________ to prevent users from immediately changing their password several times in one day to return to the

current password. This is particularly important if your password policy has a history depth of five. A. Minimum password age B. Maximum password age C. Minimum password length D. Maximum password length
Computers and Technology
2 answers:
Temka [501]4 years ago
6 0

Answer:

The answer is (B) Maximum password age.

Explanation:

To prevent several changing of passwords by a user in a day, the maximum times a password can be rest within a day is normally set by  the system administrator.

The setting ensures the password is returned to the current settings of the password on the system for the user and prevents unnecessary changing of passwords in a day by user.

qwelly [4]4 years ago
3 0

Answer:

D

Explanation:

You might be interested in
Is there any way to delete old questions on this? if there is no way, take this as a free question​
Lostsunrise [7]

Answer:

moderators have to delete it for u

Explanation:

8 0
3 years ago
Read 2 more answers
Describe the Pros and Cons Associated with Cloud Computing Cloud Computing was introduced in 1999 by a company named "Salesforce
Rudik [331]

Answer & Explanation:

Pros of cloud computing:

  • Cloud computing provides high speed due to faster deployment of services in fewer clicks.
  • It eliminates the need of IT infrastructure and manageability.
  • It is cost efficient as it provides huge space availability.
  • It makes it easy to get backup and recovery.
  • It is easy to access information anytime and anywhere in the world.
  • Due to cloud computing, it is very easy to add or remove services as required.

Cons of cloud computing:

  • It makes the data vulnerable and information theft challenges can be encountered.
  • Internet connection is required all the time.
  • There is less control available as it runs on remote servers.
  • Migrating information can become difficult.
  • It can face technical issues so the information will not be available for a limited time.
7 0
3 years ago
A destination port number at the transport layer identifies which application on a computer should receive the data transmission
Lady_Fox [76]

A destination port number at the transport layer identifies which software application on a computer should receive the data transmission: True.

<h3>What is the transport layer?</h3>

The transport layer can be defined as one of the seven layers of the open systems interconnection (OSI) model and it is responsible for routing messages through an active computer network while selecting the best transmission path from the source to the destination device.

In Computer networking, a destination port number at the transport layer is saddled with the responsibility of identifying which software application on a computer should receive the data transmission.

Read more on transport layer here: brainly.com/question/26177113

#SPJ12

7 0
2 years ago
What careers are most likely to require business skills
olchik [2.2K]

i would say maybe an accountant, entrepreneur, business reporter, or something like that.

8 0
3 years ago
A method can not be made final until whole class is madefinal.TrueFalse
Blababa [14]

Answer:

True.

Explanation:

A method can not be made final until whole class is madefinal.

4 0
3 years ago
Other questions:
  • ‘The increased availability of mobile digital devices has had a positive impact on how young people use their free time’. Make a
    14·2 answers
  • When data are entered into a form and saved, they are placed in the underlying database as knowledge?
    10·1 answer
  • PLEASE DON'T DELETE THIS QUESTION!!!!
    15·2 answers
  • What is DAP? How LDAP is different from DAP?
    10·1 answer
  • What function would you use to find the mean in a Microsoft excel document ?
    6·2 answers
  • What typically happens by default when a file is double clicked in Microsoft Windows?
    9·1 answer
  • Describe the process of normalization and why it is needed.
    12·1 answer
  • Super Scores
    11·1 answer
  • Anyone who know hacking​
    7·1 answer
  • Explain how communication facilitate cordination​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!