1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Masja [62]
3 years ago
10

Passwords are usually alphanumeric and usually cannot contain spaces or ________.

Computers and Technology
2 answers:
cricket20 [7]3 years ago
7 0

Puncuation

For ex, you can not have a password like "iamcool98,nice"

vlada-n [284]3 years ago
3 0

Answer:

The answer is A. Punctuation.  A password can contain symbols

Explanation:

You might be interested in
in which situation, a unicast session or a multicast session, can feedback received from an rtcp packet about the session be han
nikklg [1K]

The Real-time Transport Protocol is a network protocol that enables the Voice Over Internet Protocol by delivering streaming audio and video content over the internet (VoIP).

The datagram-oriented protocol is UDP. It is thus because none of the overhead associated with creating, maintaining, and closing connections exists. A network's ability to send audio and video depends on the RTP internet protocol. Designed for reliable live data delivery, the Real-time Transport Protocol (RTP) is a network standard for sending audio or video data. It is utilized in voice over IP, video telephony, and internet telephony. In the OSI model, RTP belongs to both the Presentation Layer (Layer 6) and the Session Layer (Layer 5).

Learn more about protocol here-

brainly.com/question/27581708

#SPJ4

3 0
1 year ago
Does group policy management matter without a server environment?
eimsori [14]

Answer:

The group policy management is one of the policy which used in the microsoft window that basically control the server working environment in the organization. It mainly control the user account and the personal computer account.

The group policy is the centralized management and the provide the various configuration of the operating system. It also manage and control the users setting in the active directory of the management.

Therefore, the group policy management matter in the server environment.

4 0
4 years ago
SOMEONE PLEASE HELP ME WITH THIS PLEASE!!!!!!
Brrunno [24]

Answer:

first one

Explanation:

3 0
3 years ago
System uses a 6-bit 2’s complement signed integer representation. What is the range of decimal values it can represent?
kap26 [50]

Answer:

-32 to +31

Explanation:

6 bit 2s complement representation will be of the form b1b2b3b4b5b6 where each bit is either 0 or 1.

The largest positive number that can be represented using this scheme is 011111

Translating this to decimal this is 1*2^4 + 1^2^3 + 1^2^2 + 1^2^1 + 1^2^0

=16 + 8 + 4 + 2 + 1 =31

The smallest negative number that can be represented using this scheme is 100000

Translating this to decimal = -1 * 2^5 = -32

So the range of decimal values that can be represented is -32 to +31.

6 0
4 years ago
With the Linux operating system, it’s open source design means it can be used, modified and _____ freely.
vlada-n [284]

I believe the answer would be "shared". Just like with open source software, people can modify it, use it, and share the modifications made to the software. I hope this helps!

5 0
3 years ago
Read 2 more answers
Other questions:
  • Accessing programs and documents by way of icon
    12·1 answer
  • E-mail is an efficient means of disseminating information quickly and inexpensively. However, HIPAA regulations affect e-mail us
    13·1 answer
  • Which phase takes all the detailed design documents from the design phase and transforms them into the actual system? Testing ph
    7·1 answer
  • __________ is a data analysis technique used by decision makers to quickly get answers to complex queries that encompass multipl
    6·1 answer
  • The northern half of this continent is primarily rainforest and savanna.
    5·1 answer
  • Learning how to use word processing and spreadsheets, and creating presentations are all considered __________ computer skills.
    15·2 answers
  • Hello hello . please help me​
    8·2 answers
  • A type of SDLC in which each phase has results that flow into the next phase is called the __________ model.
    8·1 answer
  • Write a method that computes the average of the values in an array of doubles. The header of the method is as follows:
    14·1 answer
  • Consider the following method, which is intended to count the number of times the letter "A" appears in the string str.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!