1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
belka [17]
3 years ago
6

Which of the following is the most effective password?

Computers and Technology
2 answers:
Ksju [112]3 years ago
6 0

the answer is B. M3r(urY      

GOOD LUCK !!!!!!!

zzz [600]3 years ago
5 0
I would have to say that the M3(ury would be the MOST effective, because it has more capitals, numbers, and symbols, which would make it harder to hack into.
You might be interested in
A ____ resembles a circle of computers that communicate with each other.
Sidana [21]

Answer:

ring network

Explanation:

In a ring network, the nodes are arranged in a circular pattern where each node is connected to two adjacent nodes. In this topology, any node can communicate with any other node via the intermediaries.

In comparison,

- in a star network every communication needs to pass through a central hub node

- in a bus, each node is connected to a shared linear communication bus.

- in a hierarchical network nodes are organized along a tree structure layout.

4 0
4 years ago
Equity is proportional ownership in a firm. Which of the following is synonymous with Equity?
Andreas93 [3]
<span>A. Certificate of License</span>
8 0
3 years ago
How are you today? I'm fine
sweet-ann [11.9K]

Answer:

no this is partick.

Explanation:

8 0
3 years ago
Read 2 more answers
Which of the following is incorrect? a. The operating cycle always is one year in duration. b. The operating cycle sometimes is
vlada-n [284]

Answer:

Explanation:

The operating system always is one year duration. If you don't believe me look it up. I am very good with computers.

7 0
3 years ago
Operators allow you to compare values then make decisions (Scratch Coding)
patriot [66]

Explanation:

ok thnka

4 0
2 years ago
Read 2 more answers
Other questions:
  • Index addressing is for traversing arrays.<br><br> True<br><br> False
    8·1 answer
  • In the spreadsheet example shown in chapter 5 ____ run from top bottom and are designated by a letter?
    12·2 answers
  • Fordham3 Hardware is known for its consensus buying center culture. Recognizing this corporate culture, someone attempting to se
    8·1 answer
  • The acceleration of a body is 3 metre per second square what does it mean​
    11·2 answers
  • Charlie does not think he will be able to finish his project by the deadline at this point in the decision making progress to so
    13·1 answer
  • Universal Containers has two customer service contact centres and each focuses on a specific product line. Each contact centre h
    7·1 answer
  • Mention five features on the desktop screen​
    5·1 answer
  • To stored three characters a computer occupies. Bytes memory space
    11·1 answer
  • Is each of the following method identifiers (a) legal and conventional, (b) legal but unconventional, or (C) illegal?
    5·1 answer
  • What are the methods of gilding<br><br>nonsense will be immediately reported. ​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!