1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dennis_Churaev [7]
3 years ago
11

Which of the following is a bad password? Select one: a. The acronym for the title of your favorite song plus the year it came o

ut. b. The month of your birthdate and your first name with alternate letters capitalized c. Your first pet's name with the number 1 between each letter. d. Your last name and the number of your house on your street e. Your social security number
Computers and Technology
1 answer:
Brut [27]3 years ago
7 0

All of them.

Hope this helps.

You might be interested in
A user deletes a message from a mailbox while on a desktop. What happens to the email message on the user's synchronized devices
gulaghasi [49]

Answer:

Explanation:

Depends on the configuration of the email because there are two protocols POP and IMAP, the most recent protocol is IMAP, we can delete an email and this It moves to a To be Deleted folder, this happens because the email is stored in the server, but with the protocol POP the email is stored in the server and downloaded to the application, if you delete an email, this is deleted in all devices.

8 0
4 years ago
Read 2 more answers
What do you think is the most important factor affecting the collection of digital data and what impact do you think that this f
borishaifa [10]

<u>Answer:</u>

<u>Privacy concerns.</u>

<u>Explanation:</u>

Privacy concerns have played an important role in how we collect digital data. For example, privacy activists believe that an individual has the right to know how his or her information is being used and that such an individual also has the right to withhold such information.

Such issues have affected the ability of law enforcement agencies to investigate criminal activities. For example, an individual who is accused of a crime may claim a <em>right to withhold his personal information, such as his mobile device, and thus he refuses to give out such information.</em>

4 0
3 years ago
The faster the film (the higher the ISO), the more visible its grain. When you are using higher ISO, you are not just bringing g
NikAS [45]
I could not tell you
3 0
3 years ago
Read 2 more answers
What does this mean, i am so confused- Explain the importance of identifying the purpose/use for pre-production documents
irina1246 [14]

Answer: These are mostly used in interior design, fashion design, and advertising. they are often used to generate ideas for a client to meet their approval before making the final product. It can help in terms of planning because it could be used to create a design or a theme.

Explanation: yw

4 0
3 years ago
how many squares can be formed by connecting four of the dots in this 5x5 array? (make sure to consider all types of squares!)
aliina [53]

25 SQUARES

How this is calculated?

  • The size of the squares doesn't matter, since the number of squares will be the same.
  • We have a row of 5 squares: and on top of this you stack 5 more squares.
  • Doing this for a total of 5 times so that we  have 5 rows with 5 squares each.
  • So we have 5 + 5 + 5 + 5 + 5 = 25 squares.

What is an array?

  • An array is a data structure that holds similar, related data.
  • Before an array can be used, it must be declared. To declare an array a programmer gives it at least two properties:
  1. an identifier
  2. a size - the number of elements it will hold

To know more about arrays, refer:

brainly.com/question/26104158

#SPJ4

4 0
2 years ago
Other questions:
  • The Security Development Life Cycle (SDLC) is a general methodology for the design and implementation of an information system.
    5·1 answer
  • What does the do not disturb button do on the iphone?
    12·1 answer
  • The U.S. economy is a free enterprise system.<br><br> True<br> False<br><br> PLEASE DONT GUESS
    8·2 answers
  • Is it possible to uninstall a program that's on your phone from computer?
    8·1 answer
  • Write a calculator program that keeps track of a subtotal like real calculators do. Start by asking the user for an initial numb
    12·1 answer
  • An Administrator wants to have a thank you email sent after the form on the "Request a Demo" landing page is submitted. Where ca
    12·1 answer
  • Write a for loop to print all elements in courseGrades, following each element with a space (including the last). Print forwards
    9·1 answer
  • The order of precedence is very important when building formulas in Excel. Which of the following formulas will produce 778 as t
    11·1 answer
  • A prime number is an integer that is divisible only by 1 and by itself. Write a program that: 1. Takes a number as an input. 2.
    5·1 answer
  • This assignment will again take the form of a compare/contrast essay. You will use the fresco of Christ Teaching the Apostles in
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!