What is the main weakness associated with the use of passwords?

A. human memory
B. encryption technology
C. handshake technology
D. human reliability


Answer: A

Computer Science & Information Technology

You might also like to view...

____ conveys meaning and is useful to one or more people.

A. Information B. Data C. Software D. Hardware

Computer Science & Information Technology

Executable programs can be identified by their extension of ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

is used to determine whether a for loop continues to iterate.

a) The initial value of the control variable b) The for keyword c) The increment value d) The loop-continuation condition

Computer Science & Information Technology

A ____________________ provides the reader with a short description of the purpose of the letter.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology