1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
3241004551 [841]
3 years ago
15

Which type of password would be considered secure?

Computers and Technology
1 answer:
Annette [7]3 years ago
6 0
A strong password obeys some password rules, such as:
- minimum length
- using characters from different classes (uppercase, lowercase, numbers, typographic characters)

Your safest bet these days is to use a password manager and have it generate one for you, so that hackers can not guess it by understanding humans' predictable mind. ;-)
You might be interested in
___MSDS provides information on how to handle, store, discard and care for potentially hazardous chemicals. true or false?​
DochEvi [55]

Answer:true

Explanation:

8 0
3 years ago
Options to rotate cells in excel are available using the _____ button in the alignment group on the home tab.
7nadin3 [17]
Options to rotate cells in excel are available using the orientation button in the alignment group on the home tab. orientation.
7 0
3 years ago
You have a network that needs 29 subnets while maximizing the number of host addresses available on each subnet. How many bits m
Tomtit [17]

Answer:

Option D) 5

Explanation:

4 subnet bits is 240 mask which provides 2^{4}, i.e., 16 subnets and provides 14 hosts for each.

In order to achieve the target and provide correct subnet mask, 5 subnet bits are required to be borrowed from the host of a classful network address as then the addition of one more subnet bit would result in 248 mask which in turn gives 5 subnet bits which results in 2^{5}, i.e., 32 subnets and 3 host with 6 host per subnet.

7 0
3 years ago
As a computer science student, which career you will select and what do you predict about the future of that specific IT-Career.
miv72 [106K]

Answer:

A cyber security agent

Explanation:

That will mean protecting organizations from being hacked by other ethical hackers

4 0
3 years ago
1. Write the full forms of the following.
Dmitry_Shevchenko [17]

Answer:

1. A) Language of graphics-oriented.

B) Initial public offering

C)

D) Central processing unit

2A) False

B) True

C) False

D) True

7 0
3 years ago
Read 2 more answers
Other questions:
  • Identify the false statement.
    8·1 answer
  • Which method can help you prevent RSI while using a keyboard?
    14·1 answer
  • When you're working on an image, it's a good idea to make a ____________ of the image, so that you'll have the original image in
    12·2 answers
  • You are attempting to upgrade a Windows Server 2008 R2 server to Windows Server 2016 Standard. What must be done in order to acc
    5·1 answer
  • What is human data,
    8·1 answer
  • You are network administrator for an Active Directory forest with a single domain. Then network has three sites with one domain
    12·1 answer
  • After turning on your computer ,it prompts you to type a password to continue the boot process. However ,you forgot the password
    10·1 answer
  • Consider the following code segment.
    5·1 answer
  • Heeeeeeeeeeeeeeeeeeeeeeeeelp pat.2
    12·1 answer
  • An instruction for the computer. Many commands put together to
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!