A strong password includes all of the following except _______ .

A. your name
B. at least eight characters
C. letters and numbers
D. at least one symbol


Answer: A

Computer Science & Information Technology

You might also like to view...

Discuss the impact (and draw an example) of using a sentinel node or dummy node at the head of a list.

What will be an ideal response?

Computer Science & Information Technology

Which of the following is NOT true about peer-to-peer networks?

A) There is no centralized authority in a P2P network. B) Computers in a P2P network belong to a workgroup. C) A P2P network does not require a network operating system. D) P2P networks are only found in homes.

Computer Science & Information Technology

A PowerPoint tool that lists information in a presentation that you might want to remove before making the presentation public is the ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

What are spheres of security? Provide examples illustrating the different components.

What will be an ideal response?

Computer Science & Information Technology