1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
inysia [295]
4 years ago
13

Which type of password would be considered secure

Computers and Technology
2 answers:
Lesechka [4]4 years ago
6 0
Hi there!

A <span> password that would be considered secure would be one that is not affiliated with anyone you know, any pet names, or your own name. Also, don't make it simple passwords like 1234 or qwerty or something like that. A good strong password is one that has a good random mix of numbers, letters, and characters. For example:

asdj93JA82d3DANQJ9yuemd0

This would be a good password. Be sure you write down your passwords and store them in a safe place that is not on your computer.

-Your friend in tech, </span><span>ASIAX </span><span>  </span><span>Frequent Answerer</span>
max2010maxim [7]4 years ago
5 0
Try using at least one capital letter and multiple number and symbols
Example: [email protected]#3
You might be interested in
Sandy's keyboard is not inputting data into her computer which key should she press to verify it is connected to her computer...
Ksivusya [100]

Answer:

Windows key,capslock key for verify connectivity

Explanation:

Sandy's can verify whether her keyboard is working or not by pressing the windows key. Caps Lock and Num lock key will turn on the light on keyboard and she shall see whether her keyboard is functioning or not. This method is being used everywhere to verify the keyboard connectivity.The light function can also be checked by using Caps Lock or Num lock key as well. Some keyboard offers the in built light, which can be turned on by pressing Alt+Space bar.

5 0
3 years ago
What group actively creates technology recommendation for the web?
xxMikexx [17]

The NETP provides actionable recommendations to implement technology and conduct research and development successfully that can advance the effective use of technology to support learning and teaching.


Hope this helps :)



6 0
3 years ago
Read 2 more answers
What are the three primary components of an Inbox?
Phantasy [73]
Three Primary Components of an Inbox:( 8 Components of an effective Email.).

Answer: 

1: From Label

2: Subject Line

3: Pre- Header

4: Content

5: Call to action

6: Images'

7: Social Media Buttons

8. Unsubscribe Option
3 0
3 years ago
Multimedia computer system required the following hardware component they are what​
Lady bird [3.3K]
To develop the system of multimedia we use the various hardware/softwarecomponents are:

The CPU: The CPU, which

is recommended for a multimedia computer should be Pentium IV or other advanced chips. The Monitor: The multimedia PC should be equipped with a monitorhaving Super

Video Graphics Arrays (SVGA) card.

Mark me as brainliest please
3 0
3 years ago
Word processing programs have different view options that you can use depending on the tasks you’re performing. Which option hel
gizmo_the_mogwai [7]
Preview, in MS word. It goes for print or publishing, whatever you desire.
7 0
4 years ago
Other questions:
  • Pretrial services programs are also known as early intervention programs. <br> a. True <br> b. False
    15·1 answer
  • Do Violent Video Games Make People More violent in Real Life ?
    14·1 answer
  • You're the network administrator for a company that has just expanded from one floor to two floors of a large building, and the
    7·1 answer
  • Pinterest, a visual bookmarking Website, logs more than 14 terabytes of new data each day, which means its storage needs are con
    10·1 answer
  • Betrand Meyer developed the ______ programming language which is not type-safe because it violates the law of contravariance.
    9·1 answer
  • 6. What is the difference between portrait and landscape orientation? What are the advantages of
    9·1 answer
  • Which category does this fall in identity theft​
    6·1 answer
  • Text Questions
    15·1 answer
  • swer from the options 1. How many basic input devices does a desktop computer have? a)2 b)3 c)1 d)4 2. The computer equipment wh
    8·1 answer
  • as a pc technician, you are on the road most of the day and use a laptop. when you get back to your office at the end of the day
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!