The most promising approach to improved password security is __________ . ??

A. user education ??
B. a proactive password checker
C. computer generated passwords
D. a reactive password checking strategy


B. a proactive password checker

Computer Science & Information Technology

You might also like to view...

To perform a calculation in a query, you add a field to the design grid called a(n) ____ field.

A. totals B. expressions C. formula D. calculated

Computer Science & Information Technology

If a graphics file cannot be opened in an image viewer, what should the next step be?

a. Examining the file's extension b. Examining the file's name c. Examining the file's header data d. Examining the file's size

Computer Science & Information Technology

The Windows feature _____ makes it easy to connect devices without manually installing device drivers.

A. Plug and Run B. Plug and Play C. Plug-In D. Plug and Install

Computer Science & Information Technology

A possible weakness of the second-chance page-replacement strategy is that if the list of pages is short, then an active page that has just moved to the back of the list after having had its referenced bit set off could quickly move to the front of the list and be selected for replacement before its referenced bit is set on. Comment on this phenomenon. Is it an anomaly in second-chance page replacement? Defend your answer carefully.

What will be an ideal response?

Computer Science & Information Technology