1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
belka [17]
3 years ago
6

Which of the following is the most effective password?

Computers and Technology
2 answers:
Ksju [112]3 years ago
6 0

the answer is B. M3r(urY      

GOOD LUCK !!!!!!!

zzz [600]3 years ago
5 0
I would have to say that the M3(ury would be the MOST effective, because it has more capitals, numbers, and symbols, which would make it harder to hack into.
You might be interested in
These are the records and traces an individual leaves behind as they use the internet
Roman55 [17]

Answer:

Option D. Digital footprints

Explanation:

<u>Digital footprint is all the stuff you leave behind as you use the Internet.</u>

4 0
3 years ago
Read 2 more answers
Write a program that passes an unspecified number of integers from command line and displays their total. Sample Run 1 command&g
Lana71 [14]

Using the computational language in JAVA it is possible to write a code that at least passes an unspecified number of integers

<h3>Writing code in JAVA</h3>

<em>class Exercise07_21</em>

<em>{</em>

<em>public static void main(String args[])</em>

<em>{</em>

<em>int sum=0;</em>

<em>for(int i=0;i<args.length;i++)</em>

<em>sum=sum+Integer.parseInt(args[i]);//converting string to integer and then adding it with sum variable and storing back in sum</em>

<em>System.out.println("The total is "+sum);//printing the sum</em>

<em>}</em>

<em>}</em>

See more about JAVA code at brainly.com/question/12975450

#SPJ1

5 0
2 years ago
Two devices are connected to the Internet and communicating with one another. A squirrel chews through one of the wires in the n
bearhunter [10]

Answer:

Fault-Tolerance

Explanation:

Fault tolerance refers to the ability of a system (computer, network, cloud cluster, etc.) to continue operating without interruption when one or more of its components fail.

5 0
4 years ago
Which of the following statements is not true about the TCP opening and closing of connections?
lubasha [3.4K]

Answer:  c.)

Explanation:

The bit SYN is used in order to synchronize segment numbers in the sender and receiving processes in hosts that are trying to start a data transmitting session between them.

It is initiated by the sending end, that set this bit to " 1", in the TCP header, starting which is known as a "3-way handshake process".

The bit SYN is not used in order to close a connection, the FIN bit is used for this purpose.

If one process set the FIN bit to "1", this means that it has no more data to send.

3 0
3 years ago
A group of computers that are interconnected in order to share information or documents is called what?
Rufina [12.5K]
It is a type of network . and the network's name is computer network
4 0
3 years ago
Other questions:
  • For a horror film, Pauline wants to show a computer-generated monster appearing from the body of an actor. How can she do this?
    8·1 answer
  • If you were going to construct a table that only included shape names with number prefixes, which shape would you include
    11·1 answer
  • One foot equals 12 inches. Write a function named feet_to_inches that accepts a number of feet as an argument and returns the nu
    15·1 answer
  • Computer software that brings together sound, video, graphics, animation, and text and adjusts content on the basis of user resp
    7·1 answer
  • If you Owned a business, what part of Microsoft Office would you use the most and why, which would you use the least and why, an
    14·1 answer
  • All of the following are helpful test taking strategies EXCEPT_______________.
    5·2 answers
  • Manuel owns a small business. He needs to calculate the amount each employee owes in Federal taxes. Manuel should
    11·2 answers
  • A water park will let a visitor on a ride if they are 48 or more inches tall OR they are 14 years old or older. WILL MARK BRAINL
    5·1 answer
  • Please do in python.Given an array of integers, create a 2-dimensional array where the first element is a distinct value from th
    13·1 answer
  • I want know answer for best way to copy formula on MS Access
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!