Users tend to choose passwords that are easy to remember. Passwords can often be broken by repeated trials. Users tend to write their passwords down. They tend to choose passwords that can be deduced by someone who knows the user (telephone numbers, name of a close friend, something about the user such as a hobby, and the like). Also, users tend to use the same password for many different systems.
What will be an ideal response?
This scheme would probably deter novice users.
Computer Science & Information Technology
You might also like to view...
Write a declaration for an enumerated type that represents the days of the week.
What will be an ideal response?
Computer Science & Information Technology
A(n) ________ summarizes information for printing and presentation of the data
Fill in the blank(s) with correct word
Computer Science & Information Technology
Using PowerPivot, a ________ does not have to be associated with a PivotTable
Fill in the blank(s) with correct word
Computer Science & Information Technology
The system catalog is also called the ____.
A. system database B. data dictionary C. master data table D. transaction database
Computer Science & Information Technology