Answer:
(a) Weak passwords
Explanation:
Typically, a password is weak if it is easily discovered by all persons including unauthorized users. When passwords to a network are weak, the network is vulnerable to unauthorized access and may permit access to proprietary code, accounting files and other sensitive documents in the network.
Examples of weak passwords are;
i. those generated from the name of a user.
ii. those generated for a user by default.
iii. those generated from words from dictionary or other similar materials.
iv. those that don't include a combination of letters and numbers and even symbols.
v. those that are short in length e.g less than 8 characters.
Answer:
Explanation:
mobile devices and the applications they help us in life devisec can individualize instruction. three specific reasons that technology is good is that it saves lives by improving medicine, keeps us connected to each other, and provides education and entertainment. One reason why technology is good is that it has saved many lives.
Hi,
Every operating system haves its own terminal.
If you are on a Windows computer open command prompt as administrator and you can delete user directory by typing.
"net user <username> /delete"
This will delete the user from the computer including his/her data.
Hopefully this will help.
r3t40
cerebrum
Explanation:
it controls all voluntary actions and also controls all the higher thought processes such as memory, judgement and reasoning
Answer:
Horrible!
Explanation: this is because all of our food would go bad firstly. Refridegerators wouldn't work. Also NO social medie taking away social media is like cutting off your O2 supply. No phones, no TV, no computers etc... but also our planet would be a better place. No pollution, no batteries harming the enviornment .