1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Furkat [3]
2 years ago
14

The IT department has rejected the password you submitted for approval to join the network. Your suggestion was "bobbie." Why di

d IT reject your choice?
1 Someone else is already using "bobbie."
2 The word does not meet your company's policy for choice of passwords.
3 It will be confusing because it could be written down as "Bobby" by mistake.
4 Because everyone knows you have a dog called Bobbie, so the password is too predictable.
Computers and Technology
2 answers:
vodomira [7]2 years ago
8 0

4. Although all of them could be true, this one is most acurate :)

Nana76 [90]2 years ago
4 0

My choice would be option 2.

1: Multiple people with the same password is technically not a problem, as long as they don't know it of eachother.

2: Every company has password complexity rules, such as minimum length requirements and the use of special characters, so it makes sense that your choice does not meet those requirements.

3: Doesn't make sense. Passwords are generally case sensitive so it is up to you to get the casing right.

4: Passwords are confidential, so validity should be checked by an algorithm, not a person. No other human with knowledge about your pets  should be viewing your password.

You might be interested in
Có n chiếc kẹo và m em bé. Hãy viết chương trình nhập vào hai số nguyên dương n, m và kiểm tra n chiếc kẹo có chia đều được cho
sleet_krkn [62]

uy ako ba yung pilipino dito hi nga kau

5 0
2 years ago
Which is the correct expansion of the term Internet?
dem82 [27]

Answer:

international network is the answer

6 0
3 years ago
Read 2 more answers
Alison discovers that a system under her control has been infected with malware, which is using a key logger to report user keys
Bond [772]

Mostly the spyware and malware protection for desktop and laptop or workstations are to protected with anti-virus regular updates. All workstation or desktop or laptops are to updated operating systems patches.

If any operating systems patched update to be schedule and checked regularly. Schedule scanning by virus scanner to be made for desktop and laptop or workstations in regular interval basis

There are third parties tools such as malware and ADWCLEANER are also available free scanner software through internet where end user can download and scanner so software will clean the malware.

Mostly end user do mistake keep the files in desktop. Most of the malware software will affect the desktop folder only.

It will also affect c:\users folder and register enter keys.

7 0
3 years ago
Which document would most likely be written in an informal style?
Masteriza [31]

Answer:

An advertisement for sportswear

Explanation:

An advertisement for sportswear would most likely be written in an informal style.

6 0
3 years ago
1. Digital videos look sharpest when they are displayed at a resolution that is larger than the frame size.
boyakko [2]

Answer:

(d) all of the above

Explanation:

This is because, not only is digital video a core technology for digital television, it also happens to be a core technology for video conferencing and video messaging. This could be seen in its application in messaging apps for private discussion of for holding official meetings between employees in virtual conference.

8 0
2 years ago
Other questions:
  • How do you read a column
    8·1 answer
  • Write a program that ask the user to enter air water or Steele and the distance that a sound wave will travel in the medium the
    6·1 answer
  • A token is combination of hardware and software that acts as a gatekeeper and prevents unauthorized users from accessing private
    11·1 answer
  • A thin red border indicates the active cell. (True or False)
    12·1 answer
  • Consider a network of 8 routers connected together to provide more than one path of connectivity between host A and host B at tw
    8·1 answer
  • Shelly tells a friend that her computer needs to be fixed because it has been producing a lot of heat and is smoking. Where is t
    10·1 answer
  • To make IPv4 addresses a little easier for human beings to understand, the 32-bit binary addresses are represented by dotted dec
    9·1 answer
  • Create the following new exceptions: PokemonException, which extends the Exception class. It must have a no-parameter constructo
    13·1 answer
  • How does a film establish the setting?
    14·1 answer
  • What word can you type using only the left home row keys and the right reach keys?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!