1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lianna [129]
3 years ago
10

Sydney Bark is twenty-three years old, and is looking forward to celebrating her birthday on April 12. For her birthday, she sav

ed up to buy a new computer, and now she must come up with a password for it.
What is the best password for Sydney to use?

Computers and Technology
1 answer:
DochEvi [55]3 years ago
5 0

Answer:

a future date

Explanation:

Because most people when trying to guess a password, start with basic ones like: 1234,abcde, password,l and dates (like their birthday). whereas, the person would never guess it was a future date like when the person would be 30 or when they are going on a trip .

You might be interested in
Difference between TIFF and BMP
Lina20 [59]

Answer:

Both TIFF and BMP are bitmap files, but TIFF files contain tags with additional information, like color space, resolution and print size, and can have 16-bit/channel depth (BMP's are limited to 8 bit). Taking a step back, there's no significant problem with first-generation JPEG files which use moderate compression.

Explanation:

4 0
3 years ago
Find what the secret message is. Get Brainliest if you are fast and correct.
Firdavs [7]

Answer:

What does your digital footprint say about you?

Explanation:

Just follow the path from the end to the start, that's how I always get mazes.

8 0
3 years ago
Read 2 more answers
You are configuring a firewall to use NAT. In the configuration, you map a private IP address directly to a persistent public IP
Ivan

Answer:

Option B (Static NAT) would be the correct choice.

Explanation:

  • Static NAT seems to be a method of NAT methodology used to navigate as well as monitor internet usage from some kind of specific public IP address to something like a private IP address.
  • Everything always allows the provision of web access to technology, repositories including network equipment inside a protected LAN with an unauthorized IP address.

Some other decisions made aren't relevant to the situation in question. So the above alternative is indeed the right one.

8 0
3 years ago
How does communication resolve problems​
Deffense [45]

Answer:

One major benefit effective communication has in resolving a conflict is the resultant reduction in anxiety, whether within a family or in the workplace. ... Using effective verbal – and nonverbal – communications further contributes to a successful resolution of conflict, either between individuals or within a group.

8 0
3 years ago
Read 2 more answers
give your opinion on if you would trust your accounts with an online bank. Explain why or why not. MANY people do not. MANY peop
blagie [28]
I would not because you never know there could be hackers and they could get your card account and spend your money. If they get your card number and you do turn up with less money there is really nothing you can do about it at that point. That's why I wouldn't trust my money to an online bank. 

                                                   Hope this helps.
                                          Sincerely, Hodctilana
5 0
3 years ago
Read 2 more answers
Other questions:
  • peter has recently bought a media player and a digital camera. he wants to buy a memory card for these devices. which memory dev
    11·1 answer
  • A time-saving strategy that helps define unfamiliar words involves using
    13·2 answers
  • How would you determine if your earned credits would transfer to a regionally accredited school?
    14·2 answers
  • You knew that you had to take this quiz so you logged into Blackboard and went to the quizzes section. In this scenario your com
    11·1 answer
  • Which of the following commands would instruct OSPF to advertise ONLY the 192.168.10.0/24 network in Area 0?
    13·1 answer
  • Consider an application that transmits data at a steady rate (for example, the sender generates an N-bit unit of data every k ti
    8·1 answer
  • The first line of defense against illicit use of, or threats to, computer resources and sensitive information is a strong authen
    14·1 answer
  • In c++
    12·1 answer
  • Identify some advantages of using Excel over lists, paper files, or simple word documents?
    6·1 answer
  • Critical Thinking Questions
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!