Must be at least 6 characters and contain at least one letter, one number and one special character. whats a good password? ive tried everything it wont let me go through !!

Answers

Answer 1
Answer: Things about you or your favourite specialities

Related Questions

If the user loads this graphic in a text-only browser how will the browser describe it?
which of the following would most effectively reduce / mitigate social engineering incidents? security awareness training intrusion detection and prevention systems increased physical security measures email monitoring
Media convergence is the result of the integration of the different media technologies. Please select the best answer from the choices provideda. True b. False
What do developers do to support software products?
Which of the following Amazon services is used to deploy machine learning models at scale? a) Amazon Web Services (AWS) b) Amazon Echo c) Amazon Fresh d) Amazon Prime

Miles has initiated a scam in which he counterfeits a well-known banking website and sends out e-mails to direct victims to it. By making this website look authentic, he is able to get victims to reveal their social security numbers, bank account numbers, and credit card numbers. What type of scam is Miles running in this scenario?

Answers

Answer: Phishing

Explanation: Phishing is a cybercrime or scam whereby targets are made to reveal their personal information like login details, credit card numbers and other confidential things by sometimes sending them emails that are supposedly from their service providers like their banks, requesting for these things to enable them make some "corrections" in their accounts, whereas the information obtained is just to steal or defraud them of their money and valuables.

Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. Like i earlier states, it occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message just for the purpose of scamming them and defrauding them. This is exactly what Miles from the question is doing.

What is a batch processing system

Answers

A batch processing system is the execution of a series of jobs in a program on a computer without manual intervention

To continue a sequence in adjacent cells, such as months of the year, use the ____ feature of Excel.

Answers

To continue a sequence in adjacent cells, such as months of the year, use the fill handle feature of excel. To be able to use it, just highlight the cell that contains the beginning date then drag down the cell using the fill handle that is shown under the cell.

While doing research on the Internet, what kind of website should you avoid because the information may be biased?

Answers

most likely blogs, because these are what people write on for personal reasons

When possible, you should avoid using _________ variables in a program?

Answers

Answer:

Global variable

Explanation:

You should avoid using global variables in a program because global variables can be accessed by any part of the code  and every function or any part of the code has the tendency to alter or modify its value. One can't limit the scope or in other words one cant simply force any part of the program not to use them or  modify it's values. Testing of large programs also becomes difficult as it is hard to keep track of the functions reading and modifying the values of global variables

What two things must you have in order to use FTP?A. E-mail client and FTP client
B. E-mail client and server
C. Files and server
D. FTP client and server

Answers

In order to use the file transfer protocol, you need to first have an FTP server, and then an FTP client who accesses that server. The FTP server is what stores all of the directory trees, and manages connections between it and each client. The FTP client is what is used to interface with the FTP server, examples of this being Cyberduck and FileZilla.