1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
belka [17]
3 years ago
14

Name five different windows password policies.

Computers and Technology
1 answer:
rodikova [14]3 years ago
6 0

The five different windows password policies are:

1. Enforce password history.

2. Minimum password length.

3. Minimum password age.

4. Maximum password age.

5. Password must meet complexity requirements. (contain symbols, numbers, letters,...) 

You might be interested in
Need help ASPA!!!!!!!!!
professor190 [17]
Answer is D the internet
7 0
3 years ago
Read 2 more answers
Is it possible to code your own game and if so then where should I go to learn and how to publish it?
const2013 [10]

Answer:

Yes there is

Explanation:

It is scratch a coding game to do almost anything you can also code flappybird

Hope this helps.

Have fun with scratch

4 0
2 years ago
Read 2 more answers
list the version of Windows you are using XP, Windows7, Windows8 and then explain the steps you will use to find the programs
zhannawk [14.2K]

The type of windows I am using is:Windows 8.1
7 0
3 years ago
Suppose that a computer can run an algorithm on a problem of size 1,024 in time t. We do not know the complexity of the algorith
Setler79 [48]

Answer:

Time Complexity of Problem - O(n)

Explanation:

When n= 1024 time taken is t. on a particular computer.

When computer is 8 times faster in same time t , n can be equal to 8192. It means on increasing processing speed input grows linearly.

When computer is 8 times slow then with same time t , n will be 128 which is (1/8)th time 1024.

It means with increase in processing speed by x factor time taken will decrease by (1/x) factor. Or input size can be increased by x times. This signifies that time taken by program grows linearly with input size n. Therefore time complexity of problem will be O(n).

If we double the speed of original machine then we can solve problems of size 2n in time t.

5 0
3 years ago
At which stage should James, a website designer, gather information about the website he wants to create, and at which stage sho
viva [34]
<h2>Answer: James should gather information in the <u><em>Learning</em></u> phase and begin the site’s coding in the <u><em>Development</em></u> phase.</h2>

8 0
3 years ago
Other questions:
  • Mara's presentation included essential information about the company's new safety procedures. She wanted to make
    13·2 answers
  • Does anyone have any social media message me
    14·1 answer
  • Computers are not just stand-alone desktop machines anymore. They are often embedded in common appliances and technology that we
    6·1 answer
  • Which is the process that a wireless router uses to translate a private ip address on internal traffic to a routable address for
    14·1 answer
  • Businesses and sometimes individuals use a _____ to assimilate all of their social media content on a specific topic to engage r
    13·1 answer
  • What is ana absolute adress
    11·1 answer
  • A bastion host allows the firewall to connect to the internal network and the perimeter network.TrueFalse
    15·1 answer
  • 20 POINTS AND BRAINLIEST TO CORRECT ANSWER
    15·2 answers
  • Is this App for real?​
    5·1 answer
  • Jeri wants to make sure she designs her web site for a specific group of people. What will help her plan who will visit the site
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!