You need strong passwords to keep unwanted users from logging onto your computer and/or from seeing your personal computer files. What are the minimum components of a strong password and what are some common examples of a weak password?

What will be an ideal response?


A strong password consists of at least eight characters of upper- and lowercase letters and numbers. A weak password includes common personal information, such as birthdays and addresses.

Computer Science & Information Technology

You might also like to view...

The name of the report as well as the parameter, if a parameter query is used, can be found in the ________ of the report

Fill in the blank(s) with correct word

Computer Science & Information Technology

The entire DNS tree is called the DNS namespace.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Vulnerability ________ is an important tool for information security management as it identifies all the security weaknesses before an attacker can exploit them.

A. assessment B. scoring C. reporting D. research

Computer Science & Information Technology

Typically, a switched network reaches saturation when its network utilization is at ____ percent.?

A. ?55 B. ?60 C. ?80 D. ?100

Computer Science & Information Technology