1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sesenic [268]
3 years ago
7

Which option is the strongest password?

Computers and Technology
2 answers:
tresset_1 [31]3 years ago
7 0

Answer:

Cats4Life

Explanation:

If john is persons name then it is kinda obvious

Delvig [45]3 years ago
7 0

Answer:

John$0763!

Explanation:

Includes Special Characters and Numbers and Capitals

You might be interested in
Explain the reason why vector graphics are highly recommended for logo​
Verdich [7]

Answer:

Currently, raster (bitmap files) and vector graphics are used in web design. But if you want to make a great logo and fully enjoy the use of it you should pick vector graphics for it in the first place. And this is why most designers opt for it.

Explanation:

  • Easier to re-edit
  • No image distortion
  • It is perfect for detailed images
  • Vector drawings are scalable
  • Vector graphics look better in print
7 0
3 years ago
MOA115 Medical Records and Insurance
Kay [80]

Based on the information given about the insurance, it should be noted that there's a difference between the covered and charged amount.

<h3>What is an insurance?</h3>

From the complete question, an insurance means a policy where an individual is entitled to financial protection.

In this case, there's a difference between the covered andd charged amount. Also, based on the table, the amount that Yan will be responsible for is 12.17.

Learn more about insurance on:

brainly.com/question/25855858

6 0
2 years ago
What guidelines should you follow when adding graphics to your presentations?
Elena L [17]
B, C, and D are the correct answers.
3 0
3 years ago
Read 2 more answers
Which term refers to actions that you would typically perform on a computer to revive it if it functions in an unexpected manner
andriy [413]
There are many answers to this question. The first step is normally a reboot, second, I would check witch task or service is taking up all the CPU cycles and check the system and error logs. The list goes on... I'm not sure how detailed you want to get.
5 0
4 years ago
Read 2 more answers
Two systems are connected by a router. Both systems and the router have transmission rates of 1,000bps. Each link has a propagat
Lisa [10]

Answer:

Two systems are connected by a router. Both systems and the router have transmission rates of 1,000bps. Each link has a propagation delay of 10ms. Also, it takes router 2ms in order to process the packet (e.g. decide where to forward it). Suppose the first system wants to send a 10,000 bit packet to the second system. How long will it take before receiver system receives the entire packet.

Transmission time for first Router = 10,000 bits / 1000 bps = 10 seconds

Receiving time for seond route r= 10,000 bits / 1000 bps = 10 seconds

Propagation delay = 10ms = .01 seconds x 2 for two delays = .02 seconds

First router 2ms to process = .002 seconds

Add all the times together and we get 20.022 seconds which is the same as or 20 seconds and 22 ms

4 0
3 years ago
Other questions:
  • Which mistakes are NOT highlighted by the spell checker in a word-processing document?
    15·2 answers
  • Bridge building is the business of: pure scientists, civil servants, or civil engineers?
    11·2 answers
  • Develop a C++ program that will determine whether a department store customer has exceeded the credit limit on a charge account.
    13·1 answer
  • Which of the following cameras is a high-end digital camera that has interchangeable lenses and uses a mirror to display on its
    13·1 answer
  • Which of the following is non-volatile storage?
    6·1 answer
  • Please tell fast plzzzzzzzz​
    11·2 answers
  • Software that requires excessive disk space or memory.
    15·1 answer
  • When hacking a website to test a secure connection and ensure internet safety, what is a good way to check the coding of the web
    14·1 answer
  • 1. It is acceptable to use a jack that has been
    13·1 answer
  • What is the difference between referential and entity integrity
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!