1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PIT_PIT [208]
3 years ago
14

You have been tasked with training end users in security best practices and have observed a trend among users in which many are

writing down their passwords.
Which of the following procedures can be implemented to provide enough security to protect resources while minimizing the need for users to write down their passwords?
A. Disable password complexity requirement.
B. Disable required passwords.
C. Lengthen the time period between forced password changes.
D. Increase password length requirement.
Computers and Technology
1 answer:
quester [9]3 years ago
7 0

Hi, A Tech-Savvy here.

Answer:

(C) Lengthen the time period between forced password changes.

You might be interested in
The expression that is tested by a switch statement must have a(n) __________ value.
Hitman42 [59]

The answer is relational.

6 0
3 years ago
Which statements about organizing messages in Outlook 2016 are true? Check all that apply. The Categories function is used for g
xenn [34]

Answer:

A. B. C. F. G.

Explanation:

5 0
3 years ago
Read 2 more answers
What do work places allow a company to do
anygoal [31]
D. They provide a platform for collaboration
8 0
3 years ago
Need help with this
andrezito [222]

Answer:

13:a. 15:c. 14:Unknown answer

6 0
3 years ago
Create a program in c/c++ which accepts user input of a decimal number in the range of 1 -100. Each binary bit of this number wi
kirill115 [55]

Answer:

// here is code in C++.

#include <bits/stdc++.h>

using namespace std;

void switch_fun(int input)

{

//array to store binary of input number

   int bin[7];

   // convert the number into binary

   for(int i=0; input>0; i++)

       {

           bin[i]=input%2;

           input= input/2;

       }

   // print the switch number and their status

   cout<<"Switch number:\t 1\t 2\t 3\t 4\t 5\t 6\t 7 \n";

   cout<<"status:      ";

   for(int j=6;j>=0;j--)

   {

   // if bit is 1 print "ON" else print "OFF"

       if(bin[j]==1)

           cout<<"\t ON";

       else

           cout<<"\t OFF";

   }

}

int main()

{

   int n;

   cout<<"enter the number between 1-100 only:");

   // read a number in decimal

   cin>>n

   // validate the input

   while(n<1 ||n>100)

   {

     cout<<"wrong input!! Input must be in between 1-100:"<<endl;

     cout<<"enter the number again :";

     cin>>n;

   }

// call the function with input parameter

  switch_fun(n);

return 0;

}

Explanation:

Read a decimal number from user. If the number is not between 1 to 100 the it will again ask user to enter the number until the input is in between 1-100.Then it will call the fun() with parameter n. First it will convert the decimal to binary array of size 7.Then print the status of switch.If bit is 1 then print "ON" else it will print "OFF".

Output:

enter the number between 1-100 only:-5

wrong input!! Input must be in between 1-100:

enter the number again :125

wrong input!! Input must be in between 1-100:

enter the number again :45

Switch number:   1       2       3       4       5       6       7

Status:          OFF     ON      OFF     ON      ON      OFF     ON

8 0
3 years ago
Other questions:
  • What are the problems with security when working on a Web Page?
    13·2 answers
  • Entering the formula =SUM(C5:C18) in cell C19 will result in which of the following?
    10·1 answer
  • Brainstorming the pros and cons of upgrading versus replacing a set of ten desktop computers _________
    6·1 answer
  • According the Keown book, which Web-based personal financial planning website is known as "the best free way to manage your mone
    6·1 answer
  • Which is not a factor that leads to technological advancement?
    8·1 answer
  • Which information purpose uses video from a security camera?
    15·1 answer
  • k-means clustering cannot be used to perform hierarchical clustering as it requires k (number of clusters) as an input parameter
    15·1 answer
  • Answer This One Question Right For Brainliest
    10·1 answer
  • A customer wants to increase his storage capacity by 25gb
    7·1 answer
  • How can you have internet without subscribing to cable?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!