1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sesenic [268]
3 years ago
8

Kelly has always used "P4ssw0rd” as her password on her online accounts. Why should she change this? Check all that apply.

Computers and Technology
2 answers:
const2013 [10]3 years ago
6 0
Answer 1, 2, and 3 are all correct. Hope this helps
Hoochie [10]3 years ago
5 0

Answer:

1,2, and 3

Explanation:

You might be interested in
Discuss the use of distributed (federated) authentication systems in use at your institution. If no such system is in use, then
aleksklad [387]

Answer:

Check the explanation

Explanation:

Distributed (federated) authentication system:

  1. • Federal identity in a information technology is a process of linking a person's identity and the attributes in multiple distinct identity management system.
  2. • It uses a single sign-on authentication; it means that one authentication credential is used to access multiple applications or the accounts.

Use of distributed (federated) authentication systems in institutions

In the institution the educational resources and other splices are offered via online, the faculty, students, alumni or other users using are accessing the resources from the various locations.

Different devices like mobile, tablet, laptop, desktop are used to access those resources.

The distributed or federated authentication identity management permits the institution to provide the access in a trustworthy, protected manner without n explosion a credentials.

• She distributed or federated authentication identity management permits the institution or individual faculty to control the access of research or other data easily and enables new level of academic collaboration

• It support the institutional policies to emend the access of valuable resources to a specific groups a use, and the incorporation of identity management across the academic government and commercial add and it make wider the possibility for interdisciplinary, inter-institutional scholarship.

BENEFITS

Students

• Make them to remember to single user id and password.

• Makes to access the educational resources across the institution and world.

• Personal information's are securely protected.

Teachers and Researchers

• flaps to create learning and research tools.

• It makes the control to access the restricted crown .

• It follows the Federal regulations and streamlines the access to the federal grant system

IT

• It eliminate the data and system redundancy

• Provides a strong and secure identity and access management.

4 0
4 years ago
Decision making process
Zanzabum
Choice is the answer you want 
7 0
3 years ago
What are the careers needed to create a video game? Name all the careers involved please.
AURORKA [14]
Audio Engineers
Interpreters and Translators
Video Game Testers
Technical Support Specialists
Marketing Managers
Market Research Analysts
Sales Representatives

6 0
3 years ago
The 10 IISSCC _____ cover 17 NIST control _____ which are arranged in three _____ called management, operational, and technical.
almond37 [142]

Answer:

Controls, families, domain

Explanation:

ISSCC means international information systems security certification consortium.

They are also known as ISC square, they offer two security certification the cissp and sccp.

7 0
3 years ago
Read 2 more answers
brielle is researching substitution ciphers. she came across a cipher in which the entire alphabet was rotated 13 steps. what ty
kogti [31]

Caesar cipher is a very common type of substitution cipher where each letter in the plaintext is moved or shifted to a known number of places down the alphabet.

The type of cipher is this is ROT13

  • ROT13ROT13 is a simple letter substitution cipher. It functions by the replacement of a letter with the 13th letter after it in the alphabet. It is commonly known as Caesar cipher used in ancient Rome

Conclusively we can say that ROT13 is a commonly known Caesar cipher that replaces a letter with the 13th letter after it in the alphabet.

Learn more from

brainly.com/question/15300028

3 0
3 years ago
Other questions:
  • Excel 2016 is primarily what type of program?
    15·1 answer
  • A network design engineer has been asked to design the IP addressing scheme for a customer network. The network will use IP addr
    6·1 answer
  • Summarizes statistical data ?
    11·1 answer
  • Name the months that have 30 days​
    6·2 answers
  • What is a prototype ?
    9·1 answer
  • What is the promotion and advertising stage of a product or service called?
    15·1 answer
  • Which line of code in this program is MOST likely to result in an error
    15·2 answers
  • My chrome book computer clock is an hour off how do I fix that
    14·1 answer
  • How many Horizontal and Vertical Rods are there in Abacus
    15·2 answers
  • What is the difference between an html opening tag and a closing tag?.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!