1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Furkat [3]
3 years ago
14

The IT department has rejected the password you submitted for approval to join the network. Your suggestion was "bobbie." Why di

d IT reject your choice?
1 Someone else is already using "bobbie."
2 The word does not meet your company's policy for choice of passwords.
3 It will be confusing because it could be written down as "Bobby" by mistake.
4 Because everyone knows you have a dog called Bobbie, so the password is too predictable.
Computers and Technology
2 answers:
vodomira [7]3 years ago
8 0

4. Although all of them could be true, this one is most acurate :)

Nana76 [90]3 years ago
4 0

My choice would be option 2.

1: Multiple people with the same password is technically not a problem, as long as they don't know it of eachother.

2: Every company has password complexity rules, such as minimum length requirements and the use of special characters, so it makes sense that your choice does not meet those requirements.

3: Doesn't make sense. Passwords are generally case sensitive so it is up to you to get the casing right.

4: Passwords are confidential, so validity should be checked by an algorithm, not a person. No other human with knowledge about your pets  should be viewing your password.

You might be interested in
AFLAC, Inc. recently implemented a company policy that all new IT projects must be coordinated and approved by the project manag
Shkiper50 [21]

Answer:

Option (E) is the correct answer to the following question.

Explanation:

Because it helps AFLAC Inc. company to run their project in a more easier way and it also helps its employees to work fast on their new IT projects by installing a WiFi network in their ALFAC inc. branch office. So, that's why they have to install a wireless network.

And the other option is not applied because these activities have to be done in all projects if the project is important either not.

8 0
3 years ago
Which unit of computer is used to processed data?​<br>Please help!!!!!!
RoseWind [281]

Hello There!

AnimeVines is here!

Is it Central Processing Unit?

HopeThisHelps!!

AnimeVines

7 0
3 years ago
Read 2 more answers
What is the purpose of concatenation?
bearhunter [10]

Explanation:

Concatenation allows you to add multiple strings together to form one long string by using the '+' operator between each string, so the purpose of concatenation is "<em>to combine two or more strings into one big string</em>" (third option).

Hope this helps :)

6 0
3 years ago
Oooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooo
mihalych1998 [28]

Answer:

ooooooooo[soooooooo ioooo egg vn

8 0
3 years ago
Think about what you have learned about work ethic. In a paragraph of no less than 125 words, explain why employers prefer to hi
Zepler [3.9K]

An individual who possesses good work ethic embodies principles like reliability, dependability, dedication to the job, teamwork and cooperation, and a self-disciplined character. Most employers seek a strong work ethic; performance depends on it; satisfaction is derived from it; and it ensures career progression. It is that untouchable effort an employee exemplifies daily, regardless of whether someone is watching or not. A company that has its employees doing exemplary well has everything to do with their performance. Thus, if you have a strong work ethic, you will have qualities that will keep you in demand by huge companies. When you are skilled at the workplace and your colleagues notice and appreciate it, you will have a very deep sense of satisfaction within you. If you put 101 percent, your willingness to work hard will be recognized and will leave you shining brightly than others when the opportunity of promotion knocks.

7 0
3 years ago
Other questions:
  • A(n) ____ is an attack that takes advantage of a system vulnerability.
    7·1 answer
  • Write a little man program that accepts three values as input and produces the largest of the three as output.
    5·1 answer
  • The interaction between information technology and organizations is influenced___________.A) solely by the decision making of mi
    12·1 answer
  • What are four different commands in Internet Explorer and identify their keyboard shortcuts
    10·1 answer
  • Need help with this
    13·1 answer
  • What form of communication are they using​
    6·1 answer
  • High level language - An object oriented programming language​
    5·1 answer
  • Fill in the blank with the correct term.
    10·2 answers
  • 13./ Write a java program to input an integer N and compute its factorial. Print the number and the factorial.
    8·1 answer
  • 1.1 give five (5) reasons why modeling is an important part of system analysis and design
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!