1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
inysia [295]
3 years ago
13

Which type of password would be considered secure

Computers and Technology
2 answers:
Lesechka [4]3 years ago
6 0
Hi there!

A <span> password that would be considered secure would be one that is not affiliated with anyone you know, any pet names, or your own name. Also, don't make it simple passwords like 1234 or qwerty or something like that. A good strong password is one that has a good random mix of numbers, letters, and characters. For example:

asdj93JA82d3DANQJ9yuemd0

This would be a good password. Be sure you write down your passwords and store them in a safe place that is not on your computer.

-Your friend in tech, </span><span>ASIAX </span><span>  </span><span>Frequent Answerer</span>
max2010maxim [7]3 years ago
5 0
Try using at least one capital letter and multiple number and symbols
Example: [email protected]#3
You might be interested in
Which of these standards has the fastest connection?
leonid [27]

Answer:

802.11ac is fastest cinnection

7 0
2 years ago
Barricades, vertical panels, drums, and cones in construction zones are known as__________ devices.
Whitepunk [10]
<span>Barricades, vertical panels, drums, and cones in construction zones are known as channelizing devices. They a</span>re used in construction and maintenance work areas <span> to notify drivers or passengers of unusual or potentially dangerous conditions in or near work areas.
</span>A barricade is a portable or fixed device having from one to three rails with appropriate markings. It is used to control traffic by closing, restricting, or delineating all or a portion of the right-of-way.<span>Drums are most commonly used to channelize or delineate traffic flow but may also be used singly or in groups to mark specific locations.</span>
6 0
3 years ago
Convert the following C program to C++.
ki77a [65]

Answer:

The program equivalent in C++ is:

<em>#include <cstdio></em>

<em>#include <cstdlib></em>

#define SIZE 5

using namespace std;

<em>int main(int argc, char *argv[]) {</em>

<em>int numerator = 25;</em>

<em>int denominator = 10;</em>

<em>FILE * inPut = fopen(argv[1], "r");</em>

<em>FILE * outPut = fopen(argv[2], "w");</em>

<em>float result = (float)numerator/denominator;</em>

<em>fprintf(outPut,"Result is %.2f\n", result);</em>

<em>float arr[SIZE];</em>

<em>for(int i = 0; i < SIZE; i++) {</em>

<em>fscanf(inPut, "%f", &arr[i]);</em>

<em>fprintf(outPut, "%7.4f\n", arr[i]);</em>

<em>}</em>

<em>return 0;</em>

<em>}</em>

Explanation:

See attachment for explanation.

Each line were numbered with equivalent line number in the C program

Download cpp
8 0
3 years ago
What is the proper order for the fetch-execute cycle?
DanielleElmas [232]
C hope that helps :)))) H G D
6 0
2 years ago
Read 2 more answers
Which is an appropriate strategy for using a workplace blog?
OLEGan [10]

Answer:

a

Explanation:

8 0
3 years ago
Other questions:
  • ___ Jacking is a crime that takes place when a hacker misdirects URL to a different site. The Link Itself Looks Safe, But the us
    11·1 answer
  • This operating system was used by individual computers an required users to type commands
    10·1 answer
  • Prompt the user ‘Enter a row vector of any numbers’ in the command window, and enter an arbitrary row vector and store it to x.
    6·1 answer
  • What should be included as part of the approval process? in relation to computer forensics
    14·1 answer
  • What is the purpose of a mail merge field?
    12·2 answers
  • The help desk received a call from a user who cannot get any print jobs to print on the locally shared printer. While questionin
    8·1 answer
  • Write the following program in C++ to print:
    15·1 answer
  • What is digital scavenger hunting? A. An application that locates addresses B. A scavenger hunt where players use GPS and digita
    5·1 answer
  • Enthusiasm codehs 7.6.4 Write a function called add_enthusiasm that takes a string and returns that string in all uppercase with
    15·1 answer
  • About C header files of C programming
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!