Users tend to choose passwords that are easy to remember. Passwords can often be broken by repeated trials. Users tend to write their passwords down. They tend to choose passwords that can be deduced by someone who knows the user (telephone numbers, name of a close friend, something about the user such as a hobby, and the like). Also, users tend to use the same password for many different systems.

What will be an ideal response?


This scheme would probably deter novice users.

Computer Science & Information Technology

You might also like to view...

Write a declaration for an enumerated type that represents the days of the week.

What will be an ideal response?

Computer Science & Information Technology

A(n) ________ summarizes information for printing and presentation of the data

Fill in the blank(s) with correct word

Computer Science & Information Technology

Using PowerPivot, a ________ does not have to be associated with a PivotTable

Fill in the blank(s) with correct word

Computer Science & Information Technology

The system catalog is also called the ____.

A. system database B. data dictionary C. master data table D. transaction database

Computer Science & Information Technology