1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
77julia77 [94]
3 years ago
9

David needs to create a password. He uses "rtjjkliusfvwr." Which of the following best explains the weakness in his password?

Computers and Technology
2 answers:
Nezavi [6.7K]3 years ago
6 0
I would also go for it is hard to remember unless he writes it down on a piece of paper he would have no trouble remembering it.
Darina [25.2K]3 years ago
3 0
I would say because it is hard to remember. Unless each one of those stands for a world, kind of like an acronym, then good luck remembering it!
You might be interested in
____ is a website that checks a submitted paper and then determines how much of the paper is unoriginal.
Lemur [1.5K]

Answer: A) Turnitin

Explanation:

Turnitin is the website that offers a good opportunity for checking the proper citation and once the information or paper is submitted and store store in this website then, it becomes its database permanently.  

It basically determine that whether the uploaded paper is original or not. The turnitin website identify the pre-phases in the document or paper. It does not accept any kind of PDF file, forms and portfolios.

All of the other given options are that particular website which determine the originality of the paper.  

5 0
3 years ago
Draw a flowchart for an algorithm which calculates how much money a student will need per week to buy a meal and two drinks each
jasenka [17]

Flowcharts are used as a prototype of an actual program.

First, I will write out the algorithm; which will be used as an explanation of the flowchart (see attachment for flowchart)

The algorithm is as follows;

1. Start

2. Get input for cost of a meal and cost of a drink;

3. Calculate the total cost for a meal and two drinks

4. Multiply the total cost of a meal and two drinks by 7, to get the weekly cost

5. Display the weekly cost

6. Stop

At the end of the algorithm/flowchart, the weekly cost is calculated and printed.

See attachment for flowchart

Read more about algorithms and flowcharts at:

brainly.com/question/18088572

3 0
3 years ago
Look at the slide.
svetlana [45]

Answer:

c

Explanation:

5 0
3 years ago
Read 2 more answers
When both gears are the same size what will they produce
djverab [1.8K]

They produce a 1:1 ratio.  The input power is equal to the output power.

7 0
4 years ago
When a module is processed:
a_sh-v [17]

Answer:

B. The computer jumps to the module, executes the instructions in the module, and then returns to the next executable instruction.

Explanation:

A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications.

A module can be defined as a separate software component or unit of a hardware program that comprises of one or more repeatable functions (tasks). A module is portable and as such can be used in various software applications or systems through a programming interface. Also, they are interoperable because they are generally compatible with various components of a software application or system.

When a module is processed, the computer jumps to the module, executes the instructions in the module, and then returns to the next executable instruction.

This ultimately implies that, the execution of an instruction by a computer is done sequentially and once the task is completed, the computer moves to the next executable instruction or command.

3 0
3 years ago
Other questions:
  • Using a loop, write a program that reads in exactly five integers and outputs the sum.
    11·1 answer
  • Like Tess, Brina has a fascinating job! She works as a software engineer with Instagram. She says that Computer Science is a way
    10·2 answers
  • Describe how the spoofing attack can affect multiple network layers (application, transport, network, and data link layers).
    14·1 answer
  • Do you think cyber-bulling is more damaging, as damaging, or less damaging than in-person bullying? Why?
    11·2 answers
  • What information should you avoid sharing when updating your status?
    14·2 answers
  • Disk drives have been getting larger. Their capacity is now often given in terabytes (TB) where 1 TBequals1000 gigabytes, or abo
    14·1 answer
  • What can a Word user do with the Customize Ribbon dialog box? Check all that apply.
    7·1 answer
  • What does a production proposal provide ?
    7·2 answers
  • The advantages and disadvantages of internet​
    6·1 answer
  • *please be serious and also answer everything * <br> I will also mark you brainliest :)
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!