1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kisachek [45]
3 years ago
10

When Judy logged on the network, she faced the message requesting that she changes her password. So, she changed her password. B

ut, she does not like to remember too many passwords. She wants to keep only one password. So, she tried to change the password again to her original password. But, she cannot change the password. Why can’t she change the password
Computers and Technology
1 answer:
jeka943 years ago
6 0

Answer:

Because reusing the old passwords possess security threats.

Explanation:

A password can be defined as a string of characters or words or phrases that are used to authenticate the identity of the user. It is also known as passcode and should be kept confidential. A password is used to access constricted systems, applications, etc.

A password or passcode is usually composed of alphabets, numbers, symbols, characters, alphanumeric, or a combination of these.

<u>In the given case, Judy was not able to change her passcode to the previous one because reusing old passwords is prohibited in any sites or systems. A system denies the user to reuse the old passwords for various reasons but most importantly due to security reasons. Though it is said that old passwords can be used after 100 times but seldom someone changes a password that much. All systems care for the security of their users thus they deny reusing old passcodes.</u>

You might be interested in
People from this cultural group are more tolerant to new ideas and opinions that differ from their own
stiks02 [169]

Answer:

B) People with low uncertainty avoidance

Explanation:

Uncertainty avoidance is how cultures differ on the amount of tolerance they have of unpredictability. Mostly, uncertainty avoidance deals with technology, law, and religion. People with low uncertainty avoidance cultures accept and feel comfortable in unstructured situations or changeable environments and  tend to be more pragmatic and more tolerant of change. People in cultures with high uncertainty avoidance try to minimize the occurrence of unknown and unusual circumstances.

5 0
3 years ago
How would be the human life in the absence of technology
Kipish [7]

Answer:

Horrible!

Explanation: this is because all of our food would go bad firstly. Refridegerators wouldn't work. Also NO social medie taking away social media  is like cutting off your O2 supply. No phones, no TV, no computers etc... but also our planet would be a better place. No pollution, no batteries harming the enviornment .

7 0
3 years ago
In this problem, we will compare the performance of a vector processor with a hybrid system that contains a scalar processor and
natka813 [3]
What are you asking??? And this computer whould be considered a super computer! The military uses these type for calibrateing missions hope this helps
3 0
4 years ago
Encryption has a remarkably long and varied history. The invention of writing was apparently soon followed by a desire to concea
Mariana [72]

Answer: (B) Symmetric key encryption

Explanation:

 The symmetric key encryption is the computerize cryptography form that are used to show an electronic message by using the key the singular encryption. It is basically used in various mathematical algorithm for the purpose of data conversion.

In the symmetric key encryption, the computer system contain the secret key which is basically used to send the encrypt information in the form of packet over the network from one computer to another.  

Therefore, Option (B) is correct.

5 0
3 years ago
Which of the following correctly describes rules for setting up a Web file structure?
kramer

Forward slashes (/) are used for web address and backslashes (\) are used for file paths is the following correctly describes rules for setting up a Web file structure.

<u>Explanation:</u>

For a way to a nearby document on a Windows machine, utilize the backslash. For a way to a web asset or record situated on a UNIX based machine (incorporates Macs, Linux), use a slash.

The explanation .NET's URI utilizes forward slashes is on the grounds that it's arranging for use in an internet browser. at the point when a slash is utilized in a formal or casual book, it is intended to show the word or. The models show the importance of the forward-slash.

4 0
3 years ago
Other questions:
  • The user documents are stored in _______ format.
    15·1 answer
  • WikiLeaks is a famous not-for-profit whistleblower website. MasterCard and Visa stopped payments to WikiLeaks after a series of
    13·1 answer
  • In a social networking site your personal information is listed under your?
    12·2 answers
  • ________ are chunks of software - installed on one's computer, tablet, or smartphone - that are gateways to games, online resour
    8·1 answer
  • Ivan wants to have code in a game that will make it possible to change the speed of a swimmer in the game. Which of these does I
    8·1 answer
  • Why might you want to save a downloaded file to your computer first instead of running it immediately?
    6·1 answer
  • Which software manages the functioning of the entire computer system<br>​
    7·2 answers
  • Which types of file formats are the best choice for files that may need to be edited later?
    14·1 answer
  • Why womt this code work????
    10·1 answer
  • What is information richness?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!