1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
borishaifa [10]
4 years ago
13

You need to design an online login form in which users have to type their name and password to log into an application. The pass

word can be a combination of numbers and letters. Which data type is most suitable for a password field? The __________ data type is most suitable to define a password field.
Computers and Technology
2 answers:
Elena L [17]4 years ago
7 0
Well, it depends if we are talking about the front end(HTML / Javascript) which grabs the data or are we taking about the back end such as php code or are we talking about the database that stores the password. Either case it is going to be a text/String field of some sort. For instance, the <input> field is going to be a text type but in a form of type="password". On the server side such as php, the code will grab this as a String type and encrypt it. 
Virty [35]4 years ago
3 0
<h2>Answer:</h2>

<u>The </u><u>String</u><u> data type is most suitable to define a password field.</u>

<h2>Explanation:</h2>

Most of the times the passwords contain letters, numbers and spaces. That is why we use string data types.  It also depends upon the programming language that we are working in. In C language string data type is used and (VARCHAR  is used in MySQL.

You might be interested in
You are working on a project to develop a new or enhanced system to help people at your college, university, or organization to
ArbitrLikvidat [17]

When you are working on a project to make or better a system to help people at your college or workplace to find jobs, then the system should be made for the student and work for the population and should be simple so people can work their way around it. You can use these following techniques.

  • Interviewing is a good way to have face to face and more interactive ways to communicate with your colleagues and clients. Unlike the next one which is a survey, this can be more personal and you'll get better answers than a computer program could.
  • Surveys are a great way to collect data and get people's opinions! It is also faster and more efficient if you're on a tight schedule.
  • A document analysis are the last ones to mention here. You can see how an already existing system is working and make a study based on that.

Five requirements in a traceability matrix that I would use are the following:

  1. Plan meetings with stakeholders who may want to work with your system development because they'll be the first ones that are upfront and into the project.
  2. Make more meetings and surveys to help people who are using your system do its purpose of finding people jobs at the workplace and college.
  3. Study your system to make sure it works and then do an analysis
  4. Make sure you do effective system documentation preparation and make sure to also have nice and helpful guides and other things that can help you and your system development.
  5. Have a team of Business Analysis visits stakeholders who will show them the ropes of the business requirements and how the system is being made and what design is going to be put out of the system.

Hope this helps. HAVE A BLESSED AND WONDERFUL DAY! As well as a great rest of Black History Month! :-)  

- Cutiepatutie ☺❀❤

6 0
4 years ago
It is important to understand the different types of DoS attacks and the symptoms of those attacks. Leaving a connection half op
solong [7]

Answer:

SYN flood attack.

Explanation:

Doing this is a symptom of an SYN flood attack. Attackers performing this type of DoS attack will try and open as many connections as possible but never fully finish the connection. This ultimately causes the system to use all of its computing power to try to resolve these failed connections which would cause the system to crash or become unresponsive. Therefore, denying service to potential clients if done correctly. This is just one of the many types of DoS attacks that exist.

8 0
3 years ago
The ABC Manufacturing company has a completely automated application system. The system, however, resides on index files and doe
Leni [432]

Answer:

Please see the attached file for complete Answer.

Explanation:

Download pdf
6 0
3 years ago
Read 2 more answers
What objective behaves like a high level array
zavuch27 [327]

Answer:

C.Vector

Explanation:

Vector is a high level array used in C++.It has the capability of resizing itself when it gets full.it has many functions that increases it's functionality like size(),begin(),end(),erase(),clear(),push_back(),pop_back() and many more and we store any kind of data type in the vector.

syntax for declaring a vector:-

vector<data type> vector name.

8 0
3 years ago
Each webpage is assigned a(n) ______, an address that identifies the location of the page on the Internet.
timofeeve [1]

Answer:

The answer is "URL".

Explanation:

The term URL is also known as the "Uniform-Resource-Locator", which is also known as the address of the website or internet file. To access this file we use to type its address in the web browser by using the "http:// or https://" protocol. It contains the domain name, with several other basic data to guide a visitor to a certain internet website called a web page.

5 0
3 years ago
Other questions:
  • Which best describes the Big Bang Theory?
    12·2 answers
  • "the firewall acts as a proxy for which two types of traffic? (choose two.)"
    14·1 answer
  • Networks provide businesses with these benefits.
    8·1 answer
  • In the web address www.microsoft, the "" is the _____ meaning _____. A. B. C. D. Group of answer choices top-level domain (TLD);
    6·1 answer
  • What is one of the first steps a financial planner might take when working with a client?
    14·2 answers
  • Love me love me say that u love me fool me fool me go on and fool me : ) answer the question thx
    6·2 answers
  • Place the steps in order for manually creating a New Contact Group
    10·2 answers
  • A sum of money is shared between 2 friends in the ratio 2 : 3. If the larger
    9·1 answer
  • DOES ANYONE KNOW COMPUTER SCIENCE?
    8·1 answer
  • A service _ consists of overhead wires and devices that connect the power company power lines to a residence.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!