1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stiv31 [10]
3 years ago
13

⦁ when creating a strong password, what are some valid criteria the password should meet?

Computers and Technology
2 answers:
AURORKA [14]3 years ago
6 0
Your password should never contain personal information that somebody can guess. The most secure passwords contain; uppercase letters, lowercase letters, numbers, and symbols in some sort of variation.
A lot of times using numbers in place of letters like using a 5 in place an S, a 3 in place of an E, a 0 in place of an O, or a 1 in place of an L or I, will increase the strength of a password.
A good example could be using "Cha1rL3g$"

Hope this helped or was helpful information!
bezimeni [28]3 years ago
4 0

Personally, I would suggest the ways that I usually used when create a password.

1. Using complicated passwords rather than simple ones.

2. Don't include personal things into a password, such as birthdate, pet's name, phone number and etc.

3. Try bets to generate unique password for each account. Reusing a password makes our personal data weak to be hacked.

4. Try long password, better with 8–12 characters, numbers, punctuations. https://www.cyclonis.com/what-is-password-policy-how-to-create-good-one/

There are many password managers can do this for us automatically. The ones I have tried are LastPass, Cyclonis Password Manager, and 1Password.

You might be interested in
The _____ _____ form of database attack injects code into user login information with one or more statements that perform action
amid [387]

Answer:

The answer is cross-site scripting(XSS)attack.

Explanation:

Hope this helps!

5 0
2 years ago
You are researching RAM for a computer you are building for a friend who will be using the system as a home office server for he
pashok25 [27]

Answer:

ECC RAM

Explanation:

ECC RAM is the most popular Random Access Memory out there that is used by most business servers. Dealing with big data for most huge businesses is crucial. The need to prevent loss of data requires that they purchase ECC RAM. ECC RAM automatically protects the systems from potential errors that occur in memory. Any abrupt changes in temporary data stored in ECC RAM are automatically corrected. This is achieved by an additional memory chip that acts as error detection for the other eight RAM chips.

8 0
3 years ago
Which of the following is NOT an example of written communication?
Veronika [31]

Answer:A conversation between co-workers

Explanation:

4 0
3 years ago
____________ are the in – built functions that perform a particular pre – defined task when used in a computer program.
saveliy_v [14]

Answer:

System software.

Explanation:

System software are the in-built functions that perform a particular pre-defined task when used in a computer program. An example of a system software is an operating system.

An operating system (OS) is a system software pre-installed on a computing device to manage or control software application, computer hardware and user processes. Some examples of an operating system are QNX, Linux, OpenVMS, MacOS, Microsoft windows, IBM, Solaris, VM etc.

4 0
3 years ago
What correlation is obtained when the pearson correlation is computed for data that have been converted to ranks?
professor190 [17]

The correlation that is obtained when the pearson correlation is computed for data that have been converted to ranks is option A) The Spearman correlation.

<h3>What is Spearman correlation used for?</h3>

Spearman's correlation is known to be one that tends to look into or measures the strength and way of monotonic relationship between two variables.

It is one that is a nonparametric measure that is often known to be rank correlation and it tends to examine  how well the association between two variables can be said to using a monotonic function.

Hence, The correlation that is obtained when the pearson correlation is computed for data that have been converted to ranks is option A) The Spearman correlation.

Learn more about correlation from

brainly.com/question/12479370

#SPJ4

See full question below

) What correlation is obtained when the Pearson correlation is computed for data that have been converted to ranks?

A) The Spearman correlation

B) The point-biserial correlation

C) The phi coefficient

D) It is still called a Pearson correlation

8 0
2 years ago
Other questions:
  • Which keys should you press to insert a comment? Ctrl+Alt+I Ctrl+Alt+C Ctrl+Alt+O Ctrl+Alt+N Ctrl+Alt+M
    15·1 answer
  • Programmers insert documentation called facts into the program code.? <br> a. True <br> b. False
    9·1 answer
  • Building relationships during your career exploration is called
    6·1 answer
  • Who initially developed what is now known as the internet?
    5·1 answer
  • To drive defensively means taking proactive measures to avoid accident situations regardless of their potential causes.
    6·2 answers
  • Describe how learning can be accessed in your class?​
    14·1 answer
  • A good practice when using public domain content is to
    7·1 answer
  • Use the drop-down menus to complete statements about archiving and backing up data fileArchiving data files manages the size of
    5·2 answers
  • Which of the following statements is true of San serif fonts?
    12·2 answers
  • Explain briefly why it is sometimes necessary to roll software back to a previous version, a procedure called "software
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!