1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
inysia [295]
3 years ago
13

Which type of password would be considered secure

Computers and Technology
2 answers:
Lesechka [4]3 years ago
6 0
Hi there!

A <span> password that would be considered secure would be one that is not affiliated with anyone you know, any pet names, or your own name. Also, don't make it simple passwords like 1234 or qwerty or something like that. A good strong password is one that has a good random mix of numbers, letters, and characters. For example:

asdj93JA82d3DANQJ9yuemd0

This would be a good password. Be sure you write down your passwords and store them in a safe place that is not on your computer.

-Your friend in tech, </span><span>ASIAX </span><span>  </span><span>Frequent Answerer</span>
max2010maxim [7]3 years ago
5 0
Try using at least one capital letter and multiple number and symbols
Example: [email protected]#3
You might be interested in
Zoom Vacuum, a family-owned manufacturer of high-end vacuums, has grown exponentially over the last few years. However, the comp
Sati [7]

Answer:

The best advice for Zoom Vacuum is  to start with a Transaction Processing System(TPS). This system will process all the day to day transactions of the system. It is like a real time system where users engage with the TPS and generate, retrieve and update the data. it would be very helpful in lowering the cost of production and at the same time manufacture and produce standard quality products.

Although, TPS alone would not be sufficient enough. so Management Information System(MIS) would be needed, that can get the data from the TPS and process it to get vital information.

This MIS will bring about information regarding the sales and inventory data about the current and well as previous years.

With the combination of TPS as well as MIS is a minimum requirement for a Zoom Vacuum to become successful in the market.

Explanation:

Solution

When we look at the description of the Zoom Vacuum manufacturing company closely, we see that the business is currently a small scale business which is trying to become a small to mid scale business. This claim is supported by the fact that there is only one manufacturing plant and three warehouses. And here, we also need to have the knowledge of the fact that small business major aim is to keep the cost low and satisfy the customers by making good products. So we need to suggest what information system is best suited for small scale business enterprises.

The best recommendation would be to start with a Transaction Processing System(TPS). This system will process all the day to day transactions of the system. It is like a real time system where users interact with the TPS and generate, retrieve and modify the data. This TPS would be very helpful in lowering the cost of production and at the same time manufacture and produce standard quality products . Also TPS can help in communicating with other vendors.

But TPS along would not be sufficient. Also Management Information System(MIS) would be required that can get the data from the TPS and process it to get vital information. This MIS will help in generating information regarding the sales and inventory data about the current and well as previous years. Also MIS can create many types of graphical reports which help in tactical planning of the enterprise.

So a combination of TPS as well as MIS is a minimum requirement for a Zoom Vacuum to become successful in the market.

7 0
3 years ago
What wireless security technology contains significant flaws and should never be used?
aalyn [17]

The wireless security technology contains significant flaws and should never be used is Wired Equivalent Privacy (WEP).

<h3>What is the primary weakness of Wired Equivalent Privacy WEP )?</h3>

Wired Equivalent Privacy (WEP) is known to be a kind of a security protocol, that is seen in the IEEE Wireless Fidelity (Wi-Fi) standard known to be 802.11b.

Note that the primary weakness of wired equivalent privacy (WEP) is that It functions only on some given brands of APs and as such, The wireless security technology contains significant flaws and should never be used is Wired Equivalent Privacy (WEP).

Learn more about wireless security from

brainly.com/question/25633298

#SPJ1

5 0
1 year ago
Given the following function definition
siniylev [52]

Answer:

B. 1 6 3

Explanation:

Given function definition for calc:

void calc (int a, int& b)

{

int c;

c = a + 2;

a = a * 3;

b = c + a;

}

Function invocation:

x = 1;

y = 2;

z = 3;

calc(x, y);

cout << x << " " << y << " " << z << endl;

  • Since x is passed by value, its value remains 1.
  • y is passed by reference to the function calc(x,y);

Tracing the function execution:

c=3

a=3

b=c+a = 6;

But b actually corresponds to y. So y=6 after function call.

  • Since z is not involved in function call, its value remain 3.

So output: 1 6 3

3 0
3 years ago
Network a0 is a process by which several protocols evolve to form a single product.
mafiozo [28]

Answer:

Convergent network

Explanation:

In networking, computers devices are connected together to communicate and share resources. Devices like routers and switches are examples of intermediate network devices and computers, smartphones, tablets and IP phones are all examples of end devices in a network.

In the past, dedicated networks are installed for separate voice, text and video packets. But as information technology evolves, one network is used for all three packets. This network is called convergent network.

6 0
2 years ago
What is meant by Program Memory is paged?
atroni [7]

Answer:

Program memory is paged, this statement is defined as in a computer system paged memory is the process of allocation of memory and storing a portion of a process of execution. Page is a unit of logical memory in a program. It follows the process of paging, as it is a method of writing an information and reading the output from the storage drive. The main advantage of this process is that it become easy to swap because everything is the same size.

7 0
3 years ago
Other questions:
  • Normal view
    10·2 answers
  • Before responding to an e-mail from another student in an online course, a student should
    13·2 answers
  • 8 POINTS!!!!!!!!
    6·2 answers
  • One purpose of the dual ignition system on an aircraft engine is to provide for?
    7·2 answers
  • Which is most harmful computer virus define​
    15·1 answer
  • ___ is an example of a function prototype.
    12·1 answer
  • Which might be included in both your speaking outline and your preparation outline? A. Detailed descriptions of each main point
    8·1 answer
  • A newly opened law firm in Kirkland decides to create a small website that provides a brief introduction of the firm, its missio
    8·1 answer
  • The birthday problem is as follows: given a group of n people in a room, what is the probability that two or more of them have t
    12·1 answer
  • Write is an I.P.O cycle? Describe with figure​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!