1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sesenic [268]
3 years ago
7

Which option is the strongest password?

Computers and Technology
2 answers:
tresset_1 [31]3 years ago
7 0

Answer:

Cats4Life

Explanation:

If john is persons name then it is kinda obvious

Delvig [45]3 years ago
7 0

Answer:

John$0763!

Explanation:

Includes Special Characters and Numbers and Capitals

You might be interested in
In order to be accredited by the Better Business Bureau, a business is required to publish a privacy notice on its website that
Svetradugi [14.3K]

Answer:

Explanation:Option D (Access)

7 0
2 years ago
Select all that apply.
Valentin [98]

Answer:

1, 3, & 4.

Is the way to do so. Good luck.

6 0
3 years ago
Answer the questions given below, share your ideas.Use the space for your answer.
Bess [88]

Answer:

I would get rid of the machine and well

8 0
2 years ago
Which step do you think is most useful from big data life cycle.why?
12345 [234]

Explanation:

Business xase evaluation is most useful because (BCA) provides a best-value analysis that considers not only cost but other quantifiable and non-quantifiable factors supporting an investment decision. This can include but is not limited to, performance, producibility, reliability, maintainability, and supportability enhancements.

Mark me brainliest

7 0
2 years ago
Which of the following is a use for a honeynet? A. Detecting network attacks and scans B. Slowing down attackers C. Concealing n
inn [45]

Answer:

A. Detecting network attacks and scans

Explanation:

Honeynet

It is a network , which is set up with the intentional vulnerabilities , in order to invite the attack , in order to determine and study the activities of the attacker .

The Honeynet is composed of one or more honey pots , which are just the computer systems , which act as a bait to trap the people who , tries to hack or penetrate into other's computer system .

Hence ,

The correct option is Detecting network attacks and scans .

5 0
3 years ago
Other questions:
  • Write a program that loops one thousand times. add all the even numbers and display the results. add all the odd numbers and dis
    13·1 answer
  • Which of the following terms describes surgery through a small incision in the abdomen?
    11·1 answer
  • Which of the following is true regarding packaged software and custom software? Group of answer choices Packaged software are ap
    13·1 answer
  • Assign the size of userInput to stringSize. Ex: if userInput is "Hello", output is: Size of userInput: 5
    7·1 answer
  • A large amount of scatter in a scatterplot is a indication that the association between the two variables is
    13·2 answers
  • 1. select the correct answer from the given options.
    5·1 answer
  • A profit of ₹ 1581 is to be divided amongst three partner P,Q and R in ratio 1/3:1/2:1/5.theshareof R will be?​
    10·1 answer
  • ARGENT !!20 POINTS <br> А ________ translates commands from a computer to draw lines on paper.
    10·2 answers
  • Why Use LinkedIn AI Automation Tools to Grow Your Sales Pipeline?
    7·1 answer
  • Writing down your main ideas, subpoints, and supporting material, then using geometric shapes and arrows to indicate logical rel
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!