1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Masja [62]
2 years ago
10

Passwords are usually alphanumeric and usually cannot contain spaces or ________.

Computers and Technology
2 answers:
cricket20 [7]2 years ago
7 0

Puncuation

For ex, you can not have a password like "iamcool98,nice"

vlada-n [284]2 years ago
3 0

Answer:

The answer is A. Punctuation.  A password can contain symbols

Explanation:

You might be interested in
A technician has just installed a new SOHO router for several users to share an Internet connection. He received a call that, wh
Katena32 [7]

Answer:

The technician needs to adjust the quality of service tool.

Explanation:

Quality of Service (QoS) tool is a feature in  routers and switches which prioritizes traffic so that more important traffic can pass first which results in an improved performance for critical network traffic.

So whenever a complaint is made to the technician that a particular user is using much of the browsing speed which is slowing down the browsing speed of others,  The technician needs to adjust the Quality of Service tool of the router that allows the router to share the bandwith among users.

7 0
2 years ago
There are three types of operators in BASIC-256 <br>a) True b) False​
Anestetic [448]

Answer:

a)True is the answer......

6 0
2 years ago
If a device is determined to have an out-of-date virus signature file, then Network Access Control (NAC) can redirect that devic
GalinKa [24]

Answer:

C. Address Resolution Protocol (ARP) poisoning.

Explanation:

An antivirus signature file is a program written to describe and remedy a group of identified malware attacks, to prevent future attacks from the described malicious softwares. It is constantly updated to identify more malicious softwares.

A network access protocol (NAC) is used to implement access control on a network, collaborating with other protocols like ARP and unifying antiviruses, intrusion detection and vulnerability assessment.

When the virus signature file is out of date, the NAC allows a new malware, the antivirus can not identify, to access the network through ARP poisoning.

4 0
2 years ago
Cuantos días tiene un año
Arte-miy333 [17]

Answer: 365 dias

Explanation:

4 0
2 years ago
Choose the parts of the browser window.
8_murik_8 [283]

Answer:

The answer is "Title bar".

Explanation:

The title bar is located on top of the screen, its color blue, which is used in browsers. It has the function, that shows the title of the web page, that you currently viewing, and other choices were wrong, which can be described as follows:

  • Enter bar is the wrong option because it is not a part of the browser.
  • The back button is also known as a backspace key which is used to delete so thing, which is written by keyboard, that's why it is wrong.
  • The forward bar is used in pipe in a module that's why it's incorrect.

4 0
2 years ago
Other questions:
  • Which of the following statements best compares and contrasts the role of story writers and script writers
    12·1 answer
  • An aerophone is an instrument that causes ________ to vibrate, thus creating sound waves.
    11·2 answers
  • Which of the following is a hardware component used to hold the BitLocker encryption key and ensures encrypted data is not acces
    5·1 answer
  • What are the benefits of using an ordered list vs. an unordered list? What are the costs?
    10·1 answer
  • Given a constant named size with a value of 5, which statement can you use to define and initialize an array of doubles named ga
    12·1 answer
  • Choose the correct term to complete the sentence.
    12·1 answer
  • Cindy tried to delete a customer but the customer still had open invoices so the system would not allow her to delete the custom
    11·1 answer
  • Employers can use spyware to track program usage by employees.
    12·1 answer
  • Bukod sa nakasulat na impormasyon ay makakakita rin ng larawan sa internet.​
    9·1 answer
  • What is this on g00gel Document, and how do I fix it?
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!