1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
11Alexandr11 [23.1K]
3 years ago
14

In what way(s) did the password you tried to use not meet the password policy requirements?

Computers and Technology
1 answer:
Gre4nikov [31]3 years ago
8 0
Depends on the organization. Password policies differ between each organization. Generally on a mainstream point of view. Passwords should generally be complex. If your passcode is too short. This could pose a risk to your account and the companies data could be at risk.

Broad range of possible pass code rules that may be blocked.

7 character limit
Capital letter and/or number figure
No easy consecutive digit or character: e.g abcd1234
You might be interested in
A user is experiencing slow performance with their computer. A technician suspects the computer has a virus and runs antivirus s
IceJOKER [234]

Answer:

The answer is "Option A"

Explanation:

Escalation is the process of manipulating a bug, design failure in software program to obtain elevated access to the resources, which are usually shielded from the user, and wrong choices can be described as follows:

  • In option B, It is wrong because It can't provide any type of problem-solving.
  • In option C, It is wrong because it is a searching module.
  • In option D, It is wrong because it is used to verify the system.
6 0
4 years ago
A camcorder has a power rating of 14 watts. If the output voltage from its battery is 7 volts, what current does it use?
daser333 [38]
It  uses 2 amps   since watts is volts times amps
6 0
4 years ago
One symptom of malware infection is that your antivirus software is disabled and cannot be re-enabled. Choose the answer. True F
Trava [24]

Answer:

False

Explanation:

Some malware software take advantage of the fact your computer has a virus and will try to advertise "anti-virus" software they made to hurt your computer even more.

4 0
3 years ago
Molly claims that she doesn’t have to proofread her code for typos because the interpreter will catch her mistakes for her. Is s
yarga [219]

Answer:

d. Yes, the interpreter will catch any syntax errors.

Explanation:

I just took the quiz and got the answer right, so I figured I'd share it here to help everyone out :3

Have a great day everyone, and keep those grades up!

4 0
3 years ago
Which statement describes a printer driver? a) It is the configuration code that is sent to a printer to identify the operating
White raven [17]

Answer:

Option (b) is the correct and suitable answer for the above question.

Explanation:

The printer is a hardware which is used to convert the soft copy of an information to a printed copy (Hard copy) of information.

To use printer hardware a computer system needs a printer driver which is used to do the conversion from soft copy to a hard copy. Hardware printer uses only for the purpose to print the copy.

The option b says that the printer driver is used to convert the document into the form of that document which the printer can understand easily. It means conversion from soft copy to hard copy. Hence it is the right option.

The reason behind the other option which is not valid because--

Option a says that the printer driver is a code but it is a software.

Option c says that the printer driver is an interface but it is a software.

Option d says that the printer driver is a cache but it is a software.

4 0
3 years ago
Other questions:
  • A network TAP serves what purpose on a network?
    7·1 answer
  • The move up only one line in Microsoft Word, use the following method: (a) press Ctrl + Home Keys (b) Press Home Keys (c) Press
    10·1 answer
  • Which is a good guideline to follow for adding animation to a presentation?. A. Use a different animation for each slide.. B. Us
    8·2 answers
  • How many frames per second can a half duplex traditional gigabit ethernet handle?
    12·1 answer
  • Describe how computers are used to access, retrieve, organize, process, maintain, interpret, and evaluate data and information.
    13·1 answer
  • A diagram of a flow chart to find the average of 10 numbers​
    7·1 answer
  • Which of these are steps in the testing cycle? Check all of the boxes that apply.
    10·2 answers
  • Write a program that gets a list of integers from a user. First, the user should be asked to enter the number of integers to be
    5·1 answer
  • What problems might scientists encounter in using this ethod in the field that you would not have encountered in the simunlation
    13·1 answer
  • Javascript and java are really just two slightly different names for the same language.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!