1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
3241004551 [841]
3 years ago
15

Which type of password would be considered secure?

Computers and Technology
1 answer:
Annette [7]3 years ago
6 0
A strong password obeys some password rules, such as:
- minimum length
- using characters from different classes (uppercase, lowercase, numbers, typographic characters)

Your safest bet these days is to use a password manager and have it generate one for you, so that hackers can not guess it by understanding humans' predictable mind. ;-)
You might be interested in
Households pay taxes to the government and receive public services. Which of the following is a public service?
Gwar [14]
C. Roads  this is the correct answer
8 0
3 years ago
How do you change the top and bottom margins of an entire document?
Firdavs [7]

Answer:

Click the Page Layout tab and then the Margins button.

Choice D is correct

Explanation:

In order to change the top and bottom margins of an entire document, simply

Click the Page Layout tab and then the Margins button.

I hope this helps..

Great Day ahead

4 0
3 years ago
Read 2 more answers
Good participation in music is strictly limited to those who perform well. true or false
sdas [7]
The answer would be false because you don't have to be good at it to participate and try your hardest
8 0
3 years ago
Read 2 more answers
GoInternet, Inc., is an Internet-access service provider that is being forced to manage numerous unwanted e-mail messages from a
marissa [1.9K]

Answer:

The correct answer to the following question is option b.)sends messages involving products of companies previously sued under the CAN-SPAM Act.

Explanation:

This act is an act of Controlling the Assault of Non-Solicited Marketing And Other things.

It is the law that establish the rules for the commercial message and the commercial e-mails, gives recipients right to have the business stops emailing them, and they outline the penalties incurred for those person who has violated the law.

8 0
3 years ago
What unit is used for measure disk size ?
Inessa [10]
Inches are the unit of measurements on a disk
8 0
3 years ago
Other questions:
  • Try writing pseudo code that describes how your device uses input data to perform the action that you want.
    9·1 answer
  • Please Do Solve it guys...
    6·1 answer
  • Write a loop that inputs words until the user enters STOP. After each input, the program should number each entry and print in t
    12·1 answer
  • How to solve a program that accepts a number as input and prints just the decimal portion
    15·2 answers
  • How do you change the Background image or picture on Windows desktop?
    9·1 answer
  • Which of the following is an advantage of using variables?
    9·1 answer
  • PLS PAK I ANSWER NITO KAILANGAN LANGPO​
    6·1 answer
  • Kellyn needs to move Slide 8 of his presentation up so that it becomes Slide 6. What best describes how he can do this using the
    11·2 answers
  • Which of the following best explains how algorithms that run on a computer can be used to solve problems?
    5·1 answer
  • What was Ada Lovelace's contribution to computer science?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!