1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Furkat [3]
3 years ago
14

The IT department has rejected the password you submitted for approval to join the network. Your suggestion was "bobbie." Why di

d IT reject your choice?
1 Someone else is already using "bobbie."
2 The word does not meet your company's policy for choice of passwords.
3 It will be confusing because it could be written down as "Bobby" by mistake.
4 Because everyone knows you have a dog called Bobbie, so the password is too predictable.
Computers and Technology
2 answers:
vodomira [7]3 years ago
8 0

4. Although all of them could be true, this one is most acurate :)

Nana76 [90]3 years ago
4 0

My choice would be option 2.

1: Multiple people with the same password is technically not a problem, as long as they don't know it of eachother.

2: Every company has password complexity rules, such as minimum length requirements and the use of special characters, so it makes sense that your choice does not meet those requirements.

3: Doesn't make sense. Passwords are generally case sensitive so it is up to you to get the casing right.

4: Passwords are confidential, so validity should be checked by an algorithm, not a person. No other human with knowledge about your pets  should be viewing your password.

You might be interested in
There are two algorithms called Alg1 and Alg2 for a problem of size n. Alg1 runs in n2 microseconds and Alg2 runs in 100n log n
nataly862011 [7]

The answer & explanation for this question is given in the attachment below.

8 0
4 years ago
Describe the conventional method of data processing​
andreyandreev [35.5K]

Answer:

The data processing is broadly divided into 6 basic steps as Data collection, storage of data, Sorting of data, Processing of data, Data analysis, Data presentation, and conclusions. There are mainly three methods used to process that are Manual, Mechanical, and Electronic.

4 0
2 years ago
Read 2 more answers
Which of the following is not considered a flow in supply chains?
kramer
I don’t know if this helps, but here are three types of main flows: flow of material/goods, flow of money/cash, and flow of information.
5 0
2 years ago
Dim Inventory() as Integer = {357, 126, 220}Call Stock(Inventory(2),Me.lblOutput)Sub Stock (ByVal Number As Integer, ByRef lblLa
aalyn [17]

Answer:

The answer is "Option c".

Explanation:

In the given visual basic code, an integer array "Inventory" is declared, that includes 3 elements, that are "357, 126, and 220". In the next line, a call stock function is used, in the function, the array is passed as a parameter and in array parameter, the index value that is "2" is passed. This function use label to print array index value, that is "220". and other options are incorrect that can be described as follows:

  • Option a and Option b both are wrong because array indexing always starts with 0 and ends with n-1, and in this array, it will take index value 2, which is not equal to 357 and 126.

6 0
3 years ago
HAS ANYONE SEEN THIS FROM BRAINLY BEFORE
FromTheMoon [43]

Answer:

yes that's what happened to me!

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • SHOW ALL YOUR WORK. REMEMBER THAT PROGRAM SEGMENTS ARE TO BE WRITTEN IN JAVA. Assume that the classes listed in the Java Quick R
    10·1 answer
  • A group of N stations share a 56-kbps pure ALOHA channel. Each station outputs a 1000-bit frame on average once every 100 sec, e
    12·1 answer
  • In the game of economics, which player has the role of providing goods and services
    10·1 answer
  • When he takes a picture, Simon freezes an action without blurring it, to show movement. Which type of photographer is he?
    9·2 answers
  • For this assignment, select one of the organizations with a prominent IT department from the Topic 1 assignment. Once identified
    11·1 answer
  • Suppose that a computer has three types of floating point operations: add, multiply, and divide. By performing optimizations to
    7·1 answer
  • 1a. Ust Seven (7) Components of a Computer?
    13·1 answer
  • Brainliest forrrrrrr frrrrrew right herrreeee
    14·1 answer
  • The LCD screens are found in​
    14·1 answer
  • What special enterprise VPN supported by Cisco devices creates VPN tunnels between branch locations as needed rather than requir
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!