List five of the different criteria that make up a secure password?

What will be an ideal response?


Use eight or more characters (14 characters or longer is better). Combine uppercase and lowercase letters, numbers, and symbols. Use at least one symbol in the second through sixth position of your password. Don't use consecutive letters or numbers, such as "abcdefg" or "12345." Don't use adjacent keys on your keyboard, such as "qwerty." Don't use your sign-in name in the password. Don't use words in any language. Don't even use numbers for letters (as in "p@ssw0rd") because programs can now guess those as well. Don't use the same password for more than one system.

Computer Science & Information Technology

You might also like to view...

Which of the following statements about Swing GUI components is false?

a. Swing components are less portable but more flexible than the original Java GUI components from package java.awt. b. Most Swing components are written completely in Java. c. Swing components allow the user to specify a uniform look-and-feel across all platforms. d. Swing components allow the user to change the look-and-feel while the program is running.

Computer Science & Information Technology

A typeface is a set of characters based on a font using a specific size and style.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What is a repeating group?

What will be an ideal response?

Computer Science & Information Technology

A PVC status could be which of the following? (Choose three.)

a. Passive b. Active c. Inactive d. Valid e. Deleted

Computer Science & Information Technology