Discuss the weaknesses inherent in password protection schemes.
What will be an ideal response?
Users tend to choose passwords that are easy to remember. Passwords can often be
broken by repeated trials. Users tend to write their passwords down. They tend to choose
passwords that can be deduced by someone who knows the user (telephone numbers, name
of a close friend, something about the user such as a hobby, and the like). Also, users tend to
use the same password for many different systems.
You might also like to view...
To select a ____ in the table in the accompanying figure, point to its left edge and click when the mouse pointer changes to a small solid upward angled pointing arrow.
A. cell B. row C. column D. none of the above
What data types would you use for the following fields: price, phone number, streetaddress, ZIP code, and notes about product usage?
What will be an ideal response?
Tables are NOT useful in presenting which of the following?
A) Lists of information B) A narrative C) A comparison of information D) A survey
____________________ speeds are slower than cable speeds and the speed of the connection degrades as the distance between the modem and the switching station gets closer to the three-mile limit.
Fill in the blank(s) with the appropriate word(s).