This quiz is meant to test your understanding of secure passwords. Click on the title and answer the following questions in the submission box: What are the characteristics of a secure password? Why is phishing harmful?

Answers

Answer 1
Answer:

Answer:

A secure password has the following characteristics:

  • long - it should be more than 15 characters
  • mix of characters - it should composed of letters (uppercase and lowercase), numbers and symbols
  • don't use dictionary word - avoid using common words such as "orange", "password"
  • don't use memorable key paths - avoid using the sequential letter or numbers such as "abc123"

Phishing is a kind of social engineering where a cyber criminals  trying to trick the victims to get benefit from them. For example, a cyber criminal can send a phishing email to tell the victims about something wrong with their credit card or bank account and provide a malicious link and persuade the victim to access their fake website that resembles an official bank website.  From there, the victims can send credential info to the cyber criminals without their awareness. Phishing can also be done through phone call. Phishing is harmful as a victim can fall into the trap of disclosing highly critical credential info that incur a huge loss of money.


Related Questions

An employee’s total weekly pay equals the hourly wage multiplied by the total number of regular hours, plus any overtime pay.Overtime pay equals the total overtime hours multiplied by 1.5 times the hourly wage.Write a program that takes as inputs the hourly wage, total regular hours, and total overtime hours and displays an employee’s total weekly pay.Below is an example of the program inputs and output:Enter the wage: $15.50Enter the regular hours: 40Enter the overtime hours: 12The total weekly pay is $899.0
What type of result does the MATCH function, when used on its own, return?
(1) Prompt the user to enter a string of their choosing. Output the string. Ex: Enter a sentence or phrase: The only thing we have to fear is fear itself. You entered: The only thing we have to fear is fear itself. (2) Complete the GetNumOfCharacters() function, which returns the number of characters in the user's string. Use a for loop in this function for practice. (2 pts) (3) In main(), call the GetNumOfCharacters() function and then output the returned result. (1 pt) (4) Implement the OutputWithoutWhitespace() function. OutputWithoutWhitespace() outputs the string's characters except for whitespace (spaces, tabs). Note: A tab is '\t'. Call the OutputWithoutWhitespace() function in main(). (2 pts) Ex: Enter a sentence or phrase: The only thing we have to fear is fear itself. You entered: The only thing we have to fear is fear itself. Number of characters: 46 String with no whitespace: The only thing we have to fear is fear itself.
In this project you will write a set of instructions (algorithm). The two grids below have colored boxes in different locations. You will create instructions to move the colored boxes in grid one to their final location in grid two. Use the example to help you. The algorithm that you will write should be in everyday language (no pseudocode or programming language). Write your instructions at the bottom of the page.Example: 1. Move the orange box 2 spaces to the right.2. Move the green box one space down. 3. Move the green box two spaces to the left.Write your instructions. Review the rubric to check your final work.Rules: All 6 colors (red, green, yellow, pink, blue, purple) must be move to their new location on the grid. Block spaces arebarriers. You cannot move through them or on them – you must move around them
e interesting application of two-dimensional arrays is magic squares. A magic square is a square matrix in which the sum of every row, every column, and both diagonals is the same. Magic squares have been studied for many years, and there are some particularly famous magic squares. Write a program to determine whether a series of square matrices are magic or not. The first line of input for each square specifies the size of the square(number of rows and columns). The square elements follow, one row per line. The end of the data is indicated by -1. Create a class called Square that has methods to construct a square of a specified size, to read in the elements of t

Most new information systems must communicate with other, existing systems, so the design of the method and details of these communication links must be precisely defined. These are called ____.

Answers

Answer:

System Interfaces.

Explanation:

Most new information systems must communicate with other, existing systems, so the design of the method and details of these communication links must be precisely defined. These are called system interfaces.

In the 2018-2019 softball season, Allison hit the ball 28 out of 67 times, this included fouls. What was her percentageof misses?

Answers

Answer:

Allison missed 58.21% of the times.

Explanation:

The first step is to divide 28 by 67 to get the answer in decimal form:

28 / 67 = 0.4179

Then, we multiplied the answer from the first step by one hundred to get the answer as a percentage:

0.4179 * 100 = 41.79%

Then 100(%) - 41.79(%) = 58.21%

Provide your own examples of the following using Python lists. Create your own examples. Do not copy them from another source. Nested lists The “*” operator List slices The “+=” operator A list filter A list operation that is legal but does the "wrong" thing, not what the programmer expects Provide the Python code and output for your program and all your examples.

Answers

Lists are used in Python to hold multiple values in one variable

(a) Nested list

A nested list is simply a list of list; i.e. a list that contains another list.

It is also called a 2 dimensional list.

An example is:

nested_list = [[ 1, 2, 3, 4]  , [ 5, 6, 7]]

(b) The “*” operator

The "*" operator is used to calculate the product of numerical values.

An example is:

num1 = num2 * num3

List slices

This is used to get some parts of a list; it is done using the ":" sign

Take for instance, you want to get the elements from the 3rd to the 5th index of a list

An example is:

firstList = [1, 2 ,3, 4, 5, 6, 7]

secondList = firstList[2:5]

The “+=” operator

This is used to add and assign values to variables

An example is:

num1 = 5

num2 = 3

num2 += num1

A list filter

This is used to return some elements of a list based on certain condition called filter.

An example that prints the even elements of a list is:

firstList = [1, 2 ,3, 4, 5, 6, 7]

print(list(filter(lambda x: x % 2 == 0, firstList)))

A valid but wrong list operation

The following operation is to return a single list, but instead it returns as many lists as possible

def oneList(x, myList=[]):

   myList.append(x)

   print(myList)

oneList(3)

oneList(4)

Read more about Python listsat:

brainly.com/question/16397886

Given six memory partitions of 100 MB, 170 MB, 40 MB, 205 MB, 300 MB, and 185 MB (in order), how would the first-fit, best-fit, and worst-fit algorithms place processes of size 200 MB, 15 MB, 185 MB, 75 MB, 175 MB, and 80 MB (in order)? Indicate which—if any—requests cannot be satisfied. Comment on how efficiently each of the algorithms manages memory.

Answers

Using First fit algorithm:

  • P1 will be allocated to F4. With this, F4 will have a remaining space of 5MB from (205 - 200).
  • P2 will be allocated to F1. With this, F1 will have a remaining space of 85MB from (100 - 15).
  • P3 will be allocated F5. With this, F5 will have a remaining space of 115MB from (300 - 185).
  • P4 will be allocated to the remaining space of F1. Since F1 has a remaining space of 85MB, if P4 is assigned there, the remaining space of F1 will be 10MB from (85 - 75).
  • P5 will be allocated to F6. With this, F6 will have a remaining space of 10MB from (185 - 175).
  • P6 will be allocated to F2. With this, F2 will have a remaining space of 90MB from (170 - 80).

Using Best-fit algorithm:

  • P1 will be allocated to F4. With this, F4 will have a remaining space of 5MB from (205 - 200).
  • P2 will be allocated to F3. With this, F3 will have a remaining space of 25MB from (40 - 15).
  • P3 will be allocated to F6. With this, F6 will have no remaining space as it is entirely occupied by P3.
  • P4 will be allocated to F1. With this, F1 will have a remaining space of of 25MB from (100 - 75).
  • P5 will be allocated to F5. With this, F5 will have a remaining space of 125MB from (300 - 175).
  • P6 will be allocated to the part of the remaining space of F5. Therefore, F5 will have a remaining space of 45MB from (125 - 80).
  • 100MB (F1), 170MB (F2), 40MB (F3), 205MB (F4), 300MB (F5) and 185MB (F6).

Using Worst-fit algorithm:

  • P1 will be allocated to F5. Therefore, F5 will have a remaining space of 100MB from (300 - 200).
  • P2 will be allocated to F4. Therefore, F4 will have a remaining space of 190MB from (205 - 15).
  • P3 will be allocated to part of F4 remaining space. Therefore, F4 will have a remaining space of 5MB from (190 - 185).
  • P4 will be allocated to F6. Therefore, the remaining space of F6 will be 110MB from (185 - 75).
  • P5 will not be allocated to any of the available space because none can contain it.
  • P6 will be allocated to F2. Therefore, F2 will have a remaining space of 90MB from (170 - 80).

Properly labeling the six different processes would be:

  • 200MB (P1),
  • 15MB (P2),
  • 185MB (P3),
  • 75MB (P4),
  • 175MB (P5)
  • 80MB (P6).

Best fit algorithm is the best as the name suggests, while the worst fit algorithm is the worst as not all memory is allocated

Read more about memory partitions here:
brainly.com/question/12726841

Answer:

We have six memory partitions, let label them:

100MB (F1), 170MB (F2), 40MB (F3), 205MB (F4), 300MB (F5) and 185MB (F6).

We also have six processes, let label them:

200MB (P1), 15MB (P2), 185MB (P3), 75MB (P4), 175MB (P5) and 80MB (P6).

Using First-fit

  1. P1 will be allocated to F4. Therefore, F4 will have a remaining space of 5MB from (205 - 200).
  2. P2 will be allocated to F1. Therefore, F1 will have a remaining space of 85MB from (100 - 15).
  3. P3 will be allocated F5. Therefore, F5 will have a remaining space of 115MB from (300 - 185).
  4. P4 will be allocated to the remaining space of F1. Since F1 has a remaining space of 85MB, if P4 is assigned there, the remaining space of F1 will be 10MB from (85 - 75).
  5. P5 will be allocated to F6. Therefore, F6 will have a remaining space of 10MB from (185 - 175).
  6. P6 will be allocated to F2. Therefore, F2 will have a remaining space of 90MB from (170 - 80).

The remaining free space while using First-fit include: F1 having 10MB, F2 having 90MB, F3 having 40MB as it was not use at all, F4 having 5MB, F5 having 115MB and F6 having 10MB.

Using Best-fit

  1. P1 will be allocated to F4. Therefore, F4 will have a remaining space of 5MB from (205 - 200).
  2. P2 will be allocated to F3. Therefore, F3 will have a remaining space of 25MB from (40 - 15).
  3. P3 will be allocated to F6. Therefore, F6 will have no remaining space as it is entirely occupied by P3.
  4. P4 will be allocated to F1. Therefore, F1 will have a remaining space of of 25MB from (100 - 75).
  5. P5 will be allocated to F5. Therefore, F5 will have a remaining space of 125MB from (300 - 175).
  6. P6 will be allocated to the part of the remaining space of F5. Therefore, F5 will have a remaining space of 45MB from (125 - 80).

The remaining free space while using Best-fit include: F1 having 25MB, F2 having 170MB as it was not use at all, F3 having 25MB, F4 having 5MB, F5 having 45MB and F6 having no space remaining.

Using Worst-fit

  1. P1 will be allocated to F5. Therefore, F5 will have a remaining space of 100MB from (300 - 200).
  2. P2 will be allocated to F4. Therefore, F4 will have a remaining space of 190MB from (205 - 15).
  3. P3 will be allocated to part of F4 remaining space. Therefore, F4 will have a remaining space of 5MB from (190 - 185).
  4. P4 will be allocated to F6. Therefore, the remaining space of F6 will be 110MB from (185 - 75).
  5. P5 will not be allocated to any of the available space because none can contain it.
  6. P6 will be allocated to F2. Therefore, F2 will have a remaining space of 90MB from (170 - 80).

The remaining free space while using Worst-fit include: F1 having 100MB, F2 having 90MB, F3 having 40MB, F4 having 5MB, F5 having 100MB and F6 having 110MB.

Explanation:

First-fit allocate process to the very first available memory that can contain the process.

Best-fit allocate process to the memory that exactly contain the process while trying to minimize creation of smaller partition that might lead to wastage.

Worst-fit allocate process to the largest available memory.

From the answer given; best-fit perform well as all process are allocated to memory and it reduces wastage in the form of smaller partition. Worst-fit is indeed the worst as some process could not be assigned to any memory partition.

Gus is developing new software in an environment in which incremental changes are released at regular intervals within a timebox. Shana is developing software for the minimum viable product stage in order to provide the development team with feedback on how to improve the application. Gus is employing the software methodology known as __________, while Shana is employing the software methodology known as __________.

Answers

Gus is employing the software methodology known as "Agile", where incremental changes are released at regular intervals within a timebox.

Given that;

Gus is developing new software in an environment in which incremental changes are released at regular intervals within a timebox.

Now Gus is employing the software methodology known as "Agile", where incremental changes are released at regular intervals within a timebox.

This approach allows for flexibility and adaptability in response to changing requirements and customer feedback.

Shana, on the other hand, is employing the software methodology known as "Lean Startup", specifically focusing on the minimum viable product (MVP) stage.

The Lean Startup methodology emphasizes rapid iteration and feedback cycles to quickly validate ideas, test assumptions, and gather insights for continuous improvement.

Hence, Both Gus and Shana are using different methodologies that align with their respective goals and stages of software development.

Learn more about the methodology;

brainly.com/question/30261646

#SPJ3

Answer: Agile, Lean

Gus is employing the software methodology known as agile, while Shana is employing the software methodology known as lean.

Which is an example of adaptive social behavior?

Answers

Birds help take care of each other's young to increase their chances of survival, and the behavior is passed on to offspring. 

Hope this helps!! :)

Answer:

D.

Explanation:

edge 2021