1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
11Alexandr11 [23.1K]
3 years ago
14

In what way(s) did the password you tried to use not meet the password policy requirements?

Computers and Technology
1 answer:
Gre4nikov [31]3 years ago
8 0
Depends on the organization. Password policies differ between each organization. Generally on a mainstream point of view. Passwords should generally be complex. If your passcode is too short. This could pose a risk to your account and the companies data could be at risk.

Broad range of possible pass code rules that may be blocked.

7 character limit
Capital letter and/or number figure
No easy consecutive digit or character: e.g abcd1234
You might be interested in
Howard is leading a project to commission a new information system that will be used by a federal government agency. He is worki
Ann [662]

Answer:

The correct answer is A.

Explanation:

Given the example in the question, Howard is at the step of implementing security controls.

There are five official steps for the risk management framework.

  1. Categorizing The Information System: In this step, the IT system's objectives are assigned based on the current mission or project.
  2. Selecting Security Controls: After the risk assesment is done, the security controls for technical, hardware and software problems are decided according to the outcome.
  3. Implementing Security Controls: In this step, the points that were decided in the step before are put into action.
  4. Authorizing The Information System: Authorization for the risk management is approved and monitored.
  5. Monitoring Security Controls: The authorities keep monitoring the process and makes any necessary changes and updates.

The process that is explained in the question is step 3, which is given in option A.

I hope this answer helps.

5 0
3 years ago
You are working on a graphical app, which includes multiple different shapes. The given code declares a base Shape class with an
ycow [4]

Answer:

maybe

Explanation:

5 0
2 years ago
Matthew is running a study on the effects of room temperature on performance on an algebra test. One group takes the test in a r
qaws [65]

Answer:

Independent variable is temperature

Explanation:

An equation has this form:    Y= f(x), where Y is dependent variable andX is independent variable.

In this case Y ( Dependent variable) is Perfomance in test, an it depends on x(Independent variable) wich is temperature.

7 0
3 years ago
Write a program that prompts the user for the lengths of the two legs of a right triangle, and which reports the length of the h
timurjin [86]

Answer: The following code is in c++

#include <iostream>

#include<math.h>

using namespace std;

int main()

{

   float a,b,c;

   cout<<"Enter height and base of triangle\n";

   cin>>a>>b;  //reading two sides from user

   c=sqrt(pow(a,2)+pow(b,2));  //calculating hypotenuse

   cout<<"Length of hypotenuse is "<<c;  //printing third side of triangle

   return 0;

}

OUTPUT :

Enter height and base of triangle                                                                                            

3                                                                                                                              

4                                                                                                                              

Length of hypotenuse is 5  

Explanation:

In the above code, three variables a, b and c of int type are declared. After that, it is asked from user to enter the value of a and b. The user puts the value and then c is calculated with the help of Pythagoras theorem formulae which squares the values of two sides and then adds them to calculate hypotenuse of a right angled triangle and finally c is printed to console.

3 0
3 years ago
In total, how many 8-bit registers are there in the Intel 80x86 CPU design presented in class? Name one of these 8-bit registers
RSB [31]

Answer:

In general the number of  bit registers in Intel 80x86 CPU design when combined together forms a 16 - bit register

An example of the  -bit registers are AH, AL, BH, BL, CH, CL, DH, and DL

Explanation:

Solution

The 8086 CPU design has a total of eight 8-bit registers and these register can be integrated together to make 16- bit register as well.

The 16-bit data is stored by breaking the data into a low-order byte and high order byte.

The name of the 8 bit registers is shown below:

AH, AL, BH, BL, CH, CL, DH, and DL

7 0
3 years ago
Other questions:
  • Which of the following is not an algorithm?
    8·1 answer
  • What do you call the number that is used as an index to pinpoint a specific element within an array?
    14·1 answer
  • By using the search functionality within a twitter stream, users can filter for:
    9·1 answer
  • How can you add contrast between text and headlines in a document? increase the font size of the headline make the headline long
    6·1 answer
  • Individuals who require better speed and performance for graphics-intensive applications (e.g., video editing, gaming, etc.) pre
    8·1 answer
  • _______ tools enable people to connect and exchange ideas.
    7·2 answers
  • What does aperture control? A)amount of light the image sensor captures when taking a photo. B)how sensitive the camera is to in
    10·2 answers
  • Which of these organs is not found in the excretory system
    7·2 answers
  • Mary can view the thumbnails of her presentation slides when she’s creating the slides which element of the programs interface i
    8·1 answer
  • What does the coding phase involve?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!