1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kisachek [45]
3 years ago
10

When Judy logged on the network, she faced the message requesting that she changes her password. So, she changed her password. B

ut, she does not like to remember too many passwords. She wants to keep only one password. So, she tried to change the password again to her original password. But, she cannot change the password. Why can’t she change the password
Computers and Technology
1 answer:
jeka943 years ago
6 0

Answer:

Because reusing the old passwords possess security threats.

Explanation:

A password can be defined as a string of characters or words or phrases that are used to authenticate the identity of the user. It is also known as passcode and should be kept confidential. A password is used to access constricted systems, applications, etc.

A password or passcode is usually composed of alphabets, numbers, symbols, characters, alphanumeric, or a combination of these.

<u>In the given case, Judy was not able to change her passcode to the previous one because reusing old passwords is prohibited in any sites or systems. A system denies the user to reuse the old passwords for various reasons but most importantly due to security reasons. Though it is said that old passwords can be used after 100 times but seldom someone changes a password that much. All systems care for the security of their users thus they deny reusing old passcodes.</u>

You might be interested in
I'm pretty sure most of you know squid game, right? Well, are the actors really dying? or is it just CGI or effects? Because it'
valentinak56 [21]

Answer:

不,他们在制作系列时使用了特殊效果。

可以看幕后!!

6 0
3 years ago
Read 2 more answers
Define a method named roleOf that takes the name of an actor as an argument and returns that actor's role. If the actor is not i
dusya [7]

Answer:

var movie = {

   // Code will be tested with different actors and movies

   name: "Interstellar",

   director: "Christopher Nolan",

   composer: "Hans Zimmer",

   cast: {

       "Matthew McConaughey": "Cooper",

       "Anne Hathaway": "Brand",

       "Jessica Chastain": "Murph",

       "Matt Damon": "Mann",

       "Mackenzie Foy": "Young Murph"

   },

   roleOf: function (actorName) {

       if (!(actorName in this.cast)) {

           return "Not in this movie.";

       }

       return this.cast[actorName];

   }

};

Explanation:

4 0
3 years ago
What is the binary number for the decimal 1024? ​
GaryK [48]

Answer:

10000000000

Explanation:

While a typical byte only goes up to 8 digits, you can expand past that by having each integer past the initial 8 just double the amount from before

8 0
3 years ago
Read 2 more answers
you are working on creating a business document with two other co-workers. Based on just information, which of the following pre
kipiarov [429]
Brainstorming, Rationalizing, and Rough Drafts.
8 0
3 years ago
Two of the major sources used today for obtaining information to create computer maps are satellites and _____________.
nikdorinn [45]
The Global Positioning System or GPS.
7 0
3 years ago
Read 2 more answers
Other questions:
  • Explain a business scenario where management information systems plays a part.
    11·1 answer
  • You are asked to install a device that will combine several connections to the Internet and provide the sum of the available net
    8·2 answers
  • How has the internet of things impacted buisness?
    15·1 answer
  • Which of the following is the definition of Internet Protocol Security ( IPSec)? A remote access client/server protocol. It is a
    13·2 answers
  • Who wants to join my zoom after school 23456+4567
    15·1 answer
  • Grooves and polished surfaces on desert pebbles are most likely caused by
    10·1 answer
  • Availability is an essential part of ________ security, and user behavior analysis and application analysis provide the data nee
    14·1 answer
  • In a period of steep increases in interest rates, which issuer is most likely to be negatively affected? A Trucking company B Ut
    9·2 answers
  • You compared each letter in the correct word to the letter guessed.
    5·1 answer
  • Which will touch the ground first an elephant or a rock?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!