What is the main weakness associated with the use of passwords?
A. human memory
B. encryption technology
C. handshake technology
D. human reliability
Answer: A
Computer Science & Information Technology
You might also like to view...
____ conveys meaning and is useful to one or more people.
A. Information B. Data C. Software D. Hardware
Computer Science & Information Technology
Executable programs can be identified by their extension of ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
is used to determine whether a for loop continues to iterate.
a) The initial value of the control variable b) The for keyword c) The increment value d) The loop-continuation condition
Computer Science & Information Technology
A ____________________ provides the reader with a short description of the purpose of the letter.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology