1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Free_Kalibri [48]
3 years ago
11

Kelly has always used "P4ssw0rd” as her password on her online accounts. Why should she change this? Check all that apply.

Computers and Technology
2 answers:
erastovalidia [21]3 years ago
5 0

Answer:

it could be easily guessed

Y_Kistochka [10]3 years ago
3 0
All of them except C
You might be interested in
When you use cloud computing, what do you need to access your files and applications?
iren [92.7K]

<u>Explanation:</u>

Cloud Computing is the use of hardware and software to deliver a service over a network means on the internet. With cloud computing, users can access files and use applications from any device that can access the Internet. An example of a Cloud Computing provider is Email.

When you have a lot of data you can upload on the cloud server. To upload your data on cloud you must have a account and permission to save and upload your data.

<u>Example is:</u> data storage sites

8 0
3 years ago
True of False - use T or F An abstract class can have instances created using the constructor of the class.
Sindrei [870]

Answer:

False

Explanation:

An instance of an abstract class cannot be created through the constructor of the class, because it does not have a complete implementation. Though, it is possible to have references of an abstract type class. Abstract classes are incomplete structures and you would have to build onto it before you are able to use it.

7 0
4 years ago
A(n) ____ instruction might look like a meaningless string of 0s and 1s, but it actually represents specific operations and stor
Makovka662 [10]

Answer:

Option d is the correct answer.

Explanation:

Machine language is a language that is understood by any machine because it is made from the electric signal which has only two states on and off. On state refers to 1 and off-state refers to 1. The computer is also a type of machine so it can also understand machine language. The above question asked about the instruction which is made by 0's and 1's and it is used for the computers then the answer is Machine language which is described above and which is stated from the option d. Hence option d is the correct answer while the other is not because--

  • Option 'a' states about COBOL language which is an example of high-level-language, not the example of machine language.
  • Option b states about the programming language which is a mixture of all language of computers.
  • Option c states about ASCII which is not the correct answer.

7 0
4 years ago
Uses of the following button in a keyboard: Prt SC, Home, Shift, Tab, Pg Up.​
creativ13 [48]

Answer:

This Print Screen key is used to take the screenshots of all that is appearing on the screen, and this can then be pasted in paint and saved in some location of the computer.

The Home key takes the cursor from the current position to the top left, or the start of the file.

Shift: There are two shift keys. And they are used to print the character in the capital. And when the caps lock is busy it can be used to print in lower case. It is also used together with arrow keys to select a part of the text.

Tab: This key moves the cursor from the current location to the location which we know as tab stops ( and the very next one).

Pg Up:​ The page up is being used for scrolling up, and the distance to which limit the scrolling will take place depends upon the application you are working on.

Explanation:

Please check the answer.

4 0
3 years ago
why do networking components need more examination from an information security perspective than from a systems development pers
padilas [110]
Networking components will eventually interact with computers and devices outside of itself. Whereas during system development you are only interacting with your program internally.

For example, when you first work on a website you can begin working on it on your personal computer not connected to the outside world. When you are done working on your website you will now upload it to a webserver (or you will create your webserver) and now you are opening up the doors so to speak to the Internet. When you "open the door" you need to make sure the proper security is in place so that no one hacks your site. This is ussually done by making sure the webserver you are on does not have any known security vulnerbilities and has the proper firewall settings to prevent unauthorized access.
4 0
4 years ago
Other questions:
  • A _______ chart compares differences in values by showing vertical bars sized relative to the values in the data series. A. line
    6·2 answers
  • What is the correct order of operations for protecting a critical section using a binary semaphore?
    15·1 answer
  • Lean production systems are sometimes referred to as pull systems because demand from customers activates the production actions
    5·1 answer
  • Write a method that takes three numerical String values and sums their values.
    14·2 answers
  • _______ view is used to size field names and controls and to apply formats.
    10·2 answers
  • This is really not a question but yall should texts me I need friends:))
    9·2 answers
  • Since JavaScript is case sensitive, one of the variables below needs to be
    11·1 answer
  • 3 uses of Microsoft word in hospital
    10·1 answer
  • Zoom and Adobe Acrobat Reader are freeware programs. What does this
    7·1 answer
  • In which cipher method are values rearranged within a block to create the ciphertext?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!