1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sedbober [7]
3 years ago
9

Which of the following best explains how devices and information can be susceptible to unauthorized access if weak passwords are

used?
A. Unauthorized individuals can deny service to a computing system by overwhelming the system with login attempts.

B. Unauthorized individuals can exploit vulnerabilities in compression algorithms to determine a user’s password from their decompressed data.

C. Unauthorized individuals can exploit vulnerabilities in encryption algorithms to determine a user’s password from their encryption key.

D. Unauthorized individuals can use data mining and other techniques to guess a user’s password.
Computers and Technology
1 answer:
kupik [55]3 years ago
3 0
B unauthorized individuals can deny
You might be interested in
As more and more computing devices move into the home environment, there's a need for a centralized storage space, called a ____
Ksivusya [100]

Answer: Network attached storage device

Explanation:

Network attached storage(NAS) is the data storage server device that is responsible for serving files to configuration and other components.Through this sever device data can be retrieved by various client and user from central disk capacity .It provides good data access to diverse user and client of data.

  • Other options are incorrect because RAID drive, server station, gigabit NIC are not the devices that centrally store huge amount of data for access.
  • Thus, the correct option is network attached storage(NAS) device

8 0
3 years ago
Please i need your help
motikmotik
Hello!

The answer would be:

C. non-linear navigation.

Explanation: Non-linear navigation lets a user navigate through material without them having to follow a strict order.

I hope that this helps you!
3 0
2 years ago
When a job is sent to other countries, as many programming jobs have been, it is said to have been datamined.
OLEGan [10]
<span>When a job is sent to other countries, as many programming jobs have been, it is said to have been datamined. </span><span>
false</span>
6 0
3 years ago
A microphone, a track ball, and speakers are all examples of ____. hardware software
djyliett [7]
Hardware . . . . . . . . . . . .  . . . . . . .. 
3 0
3 years ago
Read 2 more answers
Code Example 8-1
damaskus [11]

Answer:

Option A: FileNotFoundError

Explanation:

FileNotFoundError is an exception which is thrown when a program fail to open a specified file. The root causes of this type of error can be:

  1. The directory path to locate a target file is wrongly defined in our code due to a typo on the file name or misuse of relative directory path, such as ../ and ./ which denote two different paths.
  2. For some reasons, a target file is misplaced in a wrong directory.

Any one of the above reasons can lead to the exception to be thrown when the file doesn't exist.

6 0
3 years ago
Other questions:
  • Rebecca completed work on a computer and is verifying the functionality of the system when she finds a new problem. This problem
    13·1 answer
  • I'm curious why I would need to know this on a school learning site.
    12·1 answer
  • To locate something in the database, one must type in the keyword into the ________ of the application.
    12·1 answer
  • If you want to distribute a formatted Microsoft word document to people who don't have word save it as a __file
    5·1 answer
  • Which windows 10 edition can a device with windows 8 or 8.1 pro upgrade to
    5·1 answer
  • Information is data converted into useful, meaningful context. What are data characteristics that change or vary over time?
    8·1 answer
  • “Artificial intelligence is the tool of education in the near future”. Research on the possibility of “AI technology” in scienti
    15·1 answer
  • 6. Assume there are three small caches, each consisting of four one-word blocks. One cache is fully associative, a second is two
    5·1 answer
  • Which of the following allows you to copy
    15·1 answer
  • Which computer language uses short words known as mnemonics for writing programs?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!