1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VMariaS [17]
3 years ago
5

Which type of password would be considered secure

Computers and Technology
2 answers:
ElenaW [278]3 years ago
8 0
Most secure passwords contain a variation of; Uppercase letters, lowercase letters, numbers, and symbols.

Hope this helped!
inysia [295]3 years ago
4 0

Answer:

None of the above is the correct answer.

Explanation:

You might be interested in
(14 points) Consider the Matrix, M = 16 2 3 13 5 11 10 8 9 7 6 12 4 14 15 1 . Using the index operations write MATLAB statements
Sonja [21]

Answer:

The Matlab commands for the given index operations and corresponding outputs are given below.

Explanation:

clc   % is used to clear the command window of the Matlab

clear all   % is used to clear the variables stored in Matlab workspace

% We are given a 4x4 matrix

Matlab command:

M = [16 2 3 13; 5 11 10 8; 9 7 6 12; 4 14 15 1]

output:

M =

   16     2     3    13

    5    11    10     8

    9     7     6    12

    4    14    15     1

(a) The value in the first row and second column (ie. 2)

Matlab command:

a = M(1,2)

% where a = Matrix(row_1,column_2)

output:

a =

    2

(b) The value in the third row and third column (ie. 6)

Matlab command:

b = M(3,3)

% where b = Matrix(row_3,column_3)

output:

b =

     6  

(c) All the elements in the first row

Matlab command:

c = M(1,:)

% where c = Matrix(row_1,:)

output:

c =

   16     2     3    13

(d) All the elements in the second column

Matlab command:

d = M(:,2)

% where d = Matrix(:,column_2)

output:

d =

    2

   11

    7

   14

(e) All the elements in the first 2 rows (row 1 & 2)

Matlab command:

e = M([1,2],:)

% where e = Matrix([row_1,row_2],:)

output:

e =

   16     2     3    13

    5    11    10     8  

(f) All the elements in the last 2 columns (columns 3 & 4)

Matlab command:

f = M(:,[3,4])

% where f= Matrix(:,[column_3,column_4])

output:

f =  

    3    13

   10     8

    6    12

   15     1

(g) The elements 3 13 10 8

Matlab command:

g = [M(1,3) M(1,4); M(2,3) M(2,4)]

% where g = Matrix(row_1,column_3) M(row_1,column_4); M(row_2,column_3), M(row_2,column_4)

output:

g =

    3    13

   10     8

8 0
3 years ago
NAME THE FOUNDER OF APPLE?
larisa [96]

Answer:

Steve Jobs

Explanation:

5 0
3 years ago
Read 2 more answers
A(n) __________ records the activities of computer operators surrounding each event in a transaction.
tatiyna

Answer:

B. audit trail

Explanation:

A(n) audit trail records the activities of computer operators surrounding each event in a transaction.

7 0
3 years ago
Read 2 more answers
The concrete classes of the JCF that:_______.
olga55 [171]

Answer:

c. are optimized for fast searching of elements in a collection.

Explanation:

JCF is an acronym for Joint Collection Framework. It is a unified, ready-made architecture that comprises of Algorithms, Interfaces, and Classes.

This enables users or coders to write easy to formulate programs that can perform the actions of storing and processing data.

Part of the functions of JCF Classes is to execute standard undertakings like searching, sorting, and processing of data in a faster manner in a group or collection.

3 0
3 years ago
Need help asap
eimsori [14]

Answer:

Advancements on communication technologies played a minor part in the rise of globalization.

Explanation:

5 0
2 years ago
Other questions:
  • What are the three fundamental features of anobject-oriented programming language?
    13·1 answer
  • In controlling network traffic to minimize slow-downs, a technology called ________ is used to examine data files and sort low-p
    15·1 answer
  • Your essay is due tomorrow and you don't have time to write it. You decide to buy an essay online. You've paid for it, so it can
    8·1 answer
  • In Windows, which menu allows you to view file characteristics?
    14·1 answer
  • When the writer of a letter sends a copy to a third party without the knowledge of the person receiving the original letter, it
    11·1 answer
  • Which option allows users to access the handout master to modify it?
    13·2 answers
  • Python will ignore any line of code that begins with hashtag true or false​
    13·2 answers
  • Work-based learning can be defined as educational experiences that focus on
    6·1 answer
  • Does anyone have code hs circle pyramid 2.0?
    8·1 answer
  • What two tabs does Outlook have that PowerPoint does not? View and Send/Receive Folder and Home Folder and Home Send/Receive and
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!