1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
umka2103 [35]
4 years ago
10

How often should administrators and network users be required to change their password?

Computers and Technology
1 answer:
Sergeu [11.5K]4 years ago
8 0
Once every 3 month's
You might be interested in
Which layer in the Transmission Control Protocol/Internet Protocol (TCP/IP) model is responsible for delivering data between two
s2008m [1.1K]

Answer:

Network.

Explanation:

The Transmission Control Protocol/Internet Protocol (TCP/IP) model is a standard networking protocol which allows network devices such as routers, switches, and host computers to interconnect and communicate with one another over a network. The Transmission Control Protocol/Internet Protocol (TCP/IP) model comprises of four (4) layers and these includes;

I. Application layer.

II. Transport layer.

III. Internet layer.

IV. Network layer.

The network layer in the Transmission Control Protocol/Internet Protocol (TCP/IP) model is responsible for delivering data between two nodes.

Basically, this layer known as network layer is the fourth layer of the Transmission Control Protocol/Internet Protocol (TCP/IP) model and it is typically responsible for the transmission of packets from one network device to another.

4 0
3 years ago
Jasmine took many pictures at a photo shoot. She wants to transfer these pictures from her camera to her laptop for image enhanc
hoa [83]
The answer would more likely be A
If it’s not correct I’m very sorry
5 0
3 years ago
You need to install a 32-bit application on a 32-bit version of windows 10. In which default directory will the application be i
luda_lava [24]

Answer:

%systemdrive%\Program Files

7 0
2 years ago
Select all that apply.
Ierofanga [76]
Insert option the last one
3 0
3 years ago
Read 2 more answers
Input and output devices provide means of communication between computers and outer world<br>​
abruzzese [7]

Answer:

See explanation

Explanation:

This question seem incomplete as what's required was not stated.

To answer this question, I'll assume it's a fill-in-the-gap question

The definition given above describes computer peripherals.

Peripherals is one of the links between a computer user and the computer itself.

Through peripherals such as keyboards, mouse, light pen , one can send input into the computer.

In the same vein, one can get outputs through peripherals such as the computer monitor, speakers, printers, etc.

3 0
3 years ago
Other questions:
  • In what way do networks help to protect data?
    7·2 answers
  • Which of the following is a basic principle of improvement?
    13·1 answer
  • The process of learning by making mistakes and by trial and error is called
    9·1 answer
  • The ________ is the heart of the operating system and controls its most critical processes.
    9·1 answer
  • What is one of the most effective security tools available for protecting users from external threats?
    15·1 answer
  • The term "blog" is short for ____.
    14·1 answer
  • You must keep track of some data. Your options are: (1) A linked-list maintained in sorted order. (2) A linked-list of unsorted
    5·1 answer
  • write a program in C# that reads a set of integers and then finds and prints the sum of the even and odd integers?​
    12·1 answer
  • Write a program in java to enter a character.The program displays the message "uppercase vowel" if entered character is uppercas
    5·1 answer
  • You have been asked to replace a cracked screen on a laptop. The replacement screen was delivered today, but it did not include
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!