1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lisa [10]
3 years ago
12

The following are three possible logon scenarios. Explain why option (c) below is preferable in terms of system security. a. Wel

come to XYZ computing Enter username: jones Invalid username Enter username: b. Welcome to XYZ computing Enter username: smith Enter password: password Invalid access Enter username: c. Enter username: smith Enter password: password Invalid access Enter username: smith Enter password: FpQr56 Welcome to XYZ computing
Computers and Technology
1 answer:
SashulF [63]3 years ago
4 0

Answer:

because the password being used is of high quality

Explanation:

Option C is the most preferable in terms of system security because the password being used is of high quality. Meaning that it contains lower case and capital case letters as well as numbers. It is also a random mix of all three and is not a common word or name. The length of the password is normal but could be longer for better safety. These things make it very difficult and time-consuming for a software program to guess the password, and nearly impossible for an individual to guess.

You might be interested in
What Are the main reasons students take the SAT/ACT?
ratelena [41]
To help college application, To showcase a students intelligence and memory,and to prepare for college.
7 0
3 years ago
scientist think that two species with homologous structures probably had ____ A. Ancestor B. Fossil C. Environment D. Offspring
Gennadij [26K]
 the answer is  A : ancestor 
8 0
3 years ago
Which of the following is not related to text formatting?​
s2008m [1.1K]

Explanation:

Searching, hope that helps. its 100% correct, goodluck.

3 0
3 years ago
A network administrator enters the service password-encryption command into the configuration mode of a router. What does this c
Ad libitum [116K]

Answer:

A network administrator enters the service password-encryption command into the configuration mode of a router. What does this command accomplish? This command prevents someone from viewing the running configuration passwords. You just studied 28 terms!

3 0
3 years ago
Which part holds the "brains" of the computer?
NeTakaya

The central processing unit or CPU

Explanation:

A CPU is a chip containing millions of tiny transistors

5 0
3 years ago
Other questions:
  • if you want to present slide to fellow student or co-workers, wich productivity software should you use to create them?
    7·1 answer
  • A program is divided into 3 blocks that are being compiled on 3 parallel computers. Each block takes an Exponential amount of ti
    6·1 answer
  • 12. Which of the following is CourseBit®? (1 point)
    6·1 answer
  • A dog walks 10 km north in 2 hours and then 8 km south in 1 hour.
    10·1 answer
  • Suppose that you have been running an unknown sorting algorithm. Out of curiosity, you once stopped the algorithm when it was pa
    8·1 answer
  • Disk ___________________ helps improve the speed and efficiency of a hard disk.
    6·1 answer
  • Which of the following is considered a white collar crime?
    13·1 answer
  • A database record can best be described as:
    11·1 answer
  • Identfy two duties of the governer stationed at mombasa under portugues rule?​
    8·1 answer
  • Designing a mouse to fit well in your hand would demonstrate ..?
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!