What are some of the characteristics of weak passwords?

What will be an ideal response?


In addition to the characteristics such as using a common dictionary word, creating a short password, or using personal information in a password, there are two additional characteristics of weak passwords that may be alarming to most users:

* Any password that can be memorized is a weak password.

* Any password that is repeated on multiple accounts is a weak password.

Computer Science & Information Technology

You might also like to view...

Which library contains the function used to seed the random number generator?

A. cstdlib B. ctime C. crandom D. cmath

Computer Science & Information Technology

Choosing ____ means that each subsequent frame will contain the next object in the blend.

A. Build B. Sequence C. Pull D. Fill

Computer Science & Information Technology

Case-Based Critical Thinking QuestionsCase 6-1The professor in Melissa's class has all of the students take turns teaching a mini-lesson to the other students as a way of reinforcing their own understanding of the concept that they have been assigned to teach. Melissa is nervous, because she was assigned the topic of all of the methods that are available for showing Project 2010 information with other programs, and she knows there a lot of options available.Which of the following can Melissa use as an example of importing?

A. connecting an Excel file into your Project file so that changes made to the original file are dynamically updated in Project B. inserting a graph from Excel into a Project file, so the actual graph is stored in the Project 2010 file C. duplicating data from a cost sheet in Project 2010 and inserting it at a specific location in an Excel worksheet D. bringing Outlook task lists into a project file

Computer Science & Information Technology

Which activity involves changing or manipulating a file to conceal information?

a. Data fudging b. Data deception c. Data dumping d. Data hiding

Computer Science & Information Technology