1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ray Of Light [21]
3 years ago
14

You’ve been tasked with chairing a meeting between various departments of your organization. The purpose of the meeting is to ex

plain why weak passwords, while they are a problem, do not originate with IT. How would you BEST explain this message?
Computers and Technology
1 answer:
Ipatiy [6.2K]3 years ago
6 0

Answer: weak passwords are a problem

Explanation: one of the reason it becomes a problem is due to the fact that it gives access to hackers to infiltrate your information. So it is better to use a strong password.

You might be interested in
What is the output of the following program?<br><br> for num in range(4):<br> print (num * 2)
kolezko [41]

The range() function with one parameter defaults to a starting value of 0 and has an ending value of the number specified exclusive.

range(4) is all the integers between 0 and 4 not including 4.

for num in range(4):

   print(num*2)

The output would be 0 2 4 6 all on separate lines.

6 0
3 years ago
I NEED HELP I'LL GIVE BRAINLEST
VikaD [51]

Answer: True

Explanation: direction can be applied only to animations. direction can be applied only to transitions. direction can be applied to both animations and transitions.

5 0
3 years ago
Read 2 more answers
________ involves disconnecting individual users from their selected internet service providers and redirecting them to illegiti
Phoenix [80]

Isp-Jacking Involves disconnecting individual users from their selected Internet service providers and redirecting them to illegitimate servers.

<h3>What is internet service providers?</h3>
  • An Internet Service Provider (ISP) is a company that provides Internet access to businesses, families, and even mobile users, such as AT&T, Verizon, Comcast, or Spectrum. ISPs provide Internet access to their customers via fiber optics, satellite, copper wire, and other means.
  • Cable, fiber, DSL (Digital Subscriber Line), and satellite internet are the most common types. As a result, Internet Service Providers, or ISPs, provide the internet to a location, and WiFi providers (such as TengoInternet) route that internet (bandwidth) through an outdoor environment or structure (Campus or Hotel).A wireless Internet service provider (WISP) is an Internet service provider (ISP) that allows subscribers to connect to a server via a wireless connection such as Wi-Fi at designated hot spots (access points).
  • ISPs provide users with access to networks that contain the necessary equipment, allowing them to establish Internet connectivity. ISPs are responsible for ensuring Internet access, routing Internet traffic, resolving domain names, and maintaining the network infrastructure that enables Internet access.

To learn more about internet service providers refer to:

brainly.com/question/18000293

#SPJ13

5 0
1 year ago
write a BASIC program to calculate the total saving of a man if he earns $10,000 per month and spends 20% on food,15% on childre
Tomtit [17]

10%+20%+15%+20%= 65%

65/100 × 10000

6500

3 0
3 years ago
Preventive Maintenance will will reduce potential hardware and Software Problems. Select two factors based on which Preventive m
zimovet [89]

Answer:

Computer location or environment

Computer Use

Explanation:

Preventive maintenance are maintenance done, on a routine or regular basis, to prevent the occurrence of downtime which are not planned due to the failure of equipment in the system, and to ensure continual functionality of the system

In a computer system, therefore, preventive maintenance should focus on conditions that are on the maximum limits of the specification of the system

Therefore, the preventive maintenance of the system of the computer system is based on;

1) The computer location, such as the presence of dust in the environment, that can clog the circuit board of the system, or exposure to liquid that require ensuring protective covering of parts, or the high temperatures, that may require extra cooling through the use of fans

2) The computer usage; Including how the computer is used, either continuously, or once in a while, the traffic the computer is experiencing, the presence of temporary files, and malicious programs, that require removal.

5 0
3 years ago
Other questions:
  • write a program, using python, to determine the mean, median, and standard deviation of a list of numbers. In addition, count th
    7·1 answer
  • pen the PT Activity. Perform the tasks in the activity instructions and then answer the question. Which event will take place if
    8·1 answer
  • A Uniform Resource Locator (URL) is a formatted string of text that web browsers, email applications, and other software program
    15·2 answers
  • Your company received a call from a historical society inquiring about the possibility of networking a two-century-old building
    15·1 answer
  • What is an electronic medical record
    5·1 answer
  • What is the binary system?
    13·2 answers
  • People who are reading this:
    5·2 answers
  • Which key combination should you use
    9·2 answers
  • HELPPPPP 20 POINTS CORRECT ANSWER GETS BRAINLIEST<br>sorry wrong amount of points ;-;
    13·2 answers
  • How is a microprocessor different from an integrated circuit?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!