The following are three possible logon scenarios. Explain why option (c) below is preferable in terms of system security. a. Welcome to XYZ computing Enter username: jones Invalid username Enter username: b. Welcome to XYZ computing Enter username: smith Enter password: password Invalid access Enter username: c. Enter username: smith Enter password: password Invalid access Enter username: smith Enter password: FpQr56 Welcome to XYZ computing

Answers

Answer 1

Answer:

because the password being used is of high quality

Explanation:

Option C is the most preferable in terms of system security because the password being used is of high quality. Meaning that it contains lower case and capital case letters as well as numbers. It is also a random mix of all three and is not a common word or name. The length of the password is normal but could be longer for better safety. These things make it very difficult and time-consuming for a software program to guess the password, and nearly impossible for an individual to guess.


Related Questions

advantages of torsion in engineering​

Answers

Answer:

Ascertain product failure

which among the following shortcut key is used to check spelling​

Answers

click Alt + f7 to check spelling

Answer:

Simply click Alt + F7 keys

A) Write "T" for true statement and "F" for false statement.

ii) Programming in machine level language is very easy.
iii) In Adobe Photoshop, Rectangle tool is used to draw rectangle shape​

Answers

Answer:

ii. False

iii. True

Explanation:

Machine and assembly are referred to as a low level programming language used in writing software programs or applications with respect to computer hardware and architecture. Machine language is generally written in 0s and 1s, and as such are cryptic in nature, making them unreadable by humans but easily understandable to computers.

In view of the above, we can deduce that programming in machine level language is very difficult for humans.

Adobe Photoshop is a proprietary software application designed and developed by Adobe inc. for both Windows and MacOS operating system. It is a raster graphics editor that's typically used for imaging and graphics design. It comprises of various shape tools such as ellipse, line, polygon, triangle, custom shape and rectangle.

Generally, the Rectangle tool is used to draw rectangle shape (vector and pixel-based)​ in Adobe Photoshop.

HELP NOW PLS now now now

Answers

Answer:

6.enable data to pass between computers in a network to aid communication between users. As a network engineer, you'll have responsibility for setting up, developing and maintaining computer networks within an organisation or between organisations.

7.Sony

At times, what seems to be an effective value network can also be vulnerable to quickly losing effectiveness. At one time, Sony Corporation set up a value network designed to have a "one-stop" gaming experience for its customers. From 2003 to 2008, Sony designed an all-encompassing gaming portal. However, the network was disrupted when computer hackers began breaking into the system and retrieving sensitive banking data from the network users. As a result, the effectiveness of the network was severely compromised.

Explanation:

What is congnitive overload

Answers

Explanation:

is a situation where the teacher gives too much information or too much many tasks to Learners simmultaneously , resulting in the learner being unable to process this information

Answer:

Cognitive loadLanguageWatchEditIn cognitive psychology, cognitive load refers to the used amount of working memory resources. There are three types of cognitive load: intrinsic cognitive load is the effort associated with a specific topic; extraneous cognitive load refers to the way information or tasks are presented to a learner; and germane cognitive load refers to the work put into creating a permanent store of knowledge (a schema).Cognitive load theory was developed in the late 1980s out of a study of problem solving by John Sweller.[1] Sweller argued that instructional design can be used to reduce cognitive load in learners. Much later, other researchers developed a way to measure perceived mental effort which is indicative of cognitive load.[2][3] Task-invoked pupillary response is a reliable and sensitive measurement of cognitive load that is directly related to working memory.[4] Information may only be stored in long term memory after first being attended to, and processed by, working memory. Working memory, however, is extremely limited in both capacity and duration. These limitations will, under some conditions, impede learning. Heavy cognitive load can have negative effects on task completion, and it is important to note that the experience of cognitive load is not the same in everyone. The elderly, students, and children experience different, and more often higher, amounts of cognitive load.The fundamental tenet of cognitive load theory is that the quality of instructional design will be raised if greater consideration is given to the role and limitations of working memory. With increased distractions, particularly from cell phone use, students are more prone to experiencing high cognitive load which can reduce academic success.[5]

Explanation:

Hope it helps ^-^

#CarryOnLearning

An analyst suggests that the lower the number of clusters, would give us the strongest and most meaningful result, as opposed to a large number of clusters.

a. True
b. False

Answers

Answer:

a. True

Explanation:

Various studies have shown that this is true. Clusters allow you to group together large sets of data into smaller groups in order to find similarities between all the data. Having a smaller number of clusters has been proven to allow you to discover much simpler similarities which can have a much greater impact. Larger sets can help in discovering more unique similarities but they do not have as large of an impact and are less meaningful. This is also why it is recommended to have a lower number of clusters when analyzing data sets.

If an audio signal is to be coded, either for compression or for digital transmission, it must undergo some form of quantization. Most often, a general technique known as vector quantization is employed for this task, but this technique must be tailored to the specific application so it will not be addressed here. In this assignment, we will observe the effect of uniformly quantizing the samples of two audio signals.
a) Record your voice for 4 seconds and play it again using predefined MATLAB audio functions.
b) Use your Uquant function to quantize each of these signals to 7, 4, 2 and 1 bits/sample.
c) Listen to the original and quantized signals and answer the following questions using the comments in the same MATLAB file:
1- For each signal, describe the change in quality as the number of b/sample is reduced?
2- For each signal, is there a point at which the signal quality deteriorates drastically?
3- At what point (if any) does it become incomprehensible?
4- Which signal's quality deteriorates faster as the number of levels decreases?
5. Do you think 4 b/sample is acceptable for telephone systems? ... 2 b/sample?
d) Use subplot to plot in the same figure, the four quantized speech signals over the index range 7201:7400.

Answers

Answer:

bakakkallalalnabzjs d bannn my account pls

Accenture is helping a large retailer transform their online sales and services. The Data Analyst audits the client’s customer journey and maps out the kind of data they need to collect at each touch point. How does this help the client achieve their objectives?

Answers

Answer:

d. by increasing their customer knowledge and leveraging that information to improve customer experience

Explanation:

Consumers are at the heart of all businesses as they are the ones who our product are targeted. They purchase these goods and the company makes profit. Therefore, it is paramount for businesses to identify their target consumers in other to understand their preference and serve them accordingly. With data analytics, a consumers purchase history, likes and viewed products may be used to improve relationship between consumers and service providers. Once a consumer's preference is anlysed using data, then this is leveraged to improve the kind of service offered to such consumer leasing to better consumer experience.

The way in which the auditing of the client’s customer journey and mapping out the kind of data they need to collect at each touch point helps the client achieve their objectives is;

A: by updating their sales platform and adding new features

The missing options are;

A. by updating their sales platform and adding new features

B. by shifting the focus away from the customer and towards new products or services

C. by identifying products that are poor sellers and removing them from the inventory

D. by increasing their customer knowledge and leveraging that information to improve customer experience.

Looking at the given options, the one that is correct is Option A. This is because the company will by that medium, introduce new features that would be very useful in making the sales platform to be more efficient.

Now, Accenture is a company that does consultancy services by providing digital solutions to companies to help them to optimize their business operations. Thus, their different tools will help to give this their client an extra edge that will give them a good advantage over their competitors.

Read more about Accenture at; https://brainly.com/question/25702705

1 convert (101011)2 ( )10 ? convert(596)10= ( )16 ? convert( 101011101)2 ( )16 ? convert(37)10= ( )2 ?​

Answers

Question:

(a) convert (101011)₂ = ( )₁₀ ?

(b) convert(596)₁₀= ( )₁₆ ?

(c) convert( 101011101)₂ = ( )₁₆ ?

(d) convert(37)₁₀= ( )₂ ?​

Answer:

(a) (101011)₂ = ( 43)₁₀

(b) (596)₁₀= ( 254)₁₆

(c) ( 101011101)₂ = ( 15D)₁₆

(d) (37)₁₀= ( 100101)₂

Explanation:

(a) convert (101011)₂ = ( )₁₀

This means that (101011)₂ be converted to base 10 (decimal).

To convert from binary to decimal, find the sum of the binary digits times their power of 2. i.e

(101011)₂ = 1 x 2⁵ + 0 x 2⁴ + 1 x 2³ + 0 x 2² + 1 x 2¹ + 1 x 2⁰

(101011)₂ = 1 x 32 + 0 x 16 + 1 x 8 + 0 x 4 + 1 x 2 + 1 x 1

(101011)₂ = 32 + 0 + 8 + 0 + 2 + 1

(101011)₂ = 43₁₀

Therefore, (101011)₂ = ( 43)₁₀

(b) convert(596)₁₀= ( )₁₆

This means that (596)₁₀ be converted to base 16 (hexadecimal).

To convert from decimal to hexadecimal,

i. start by dividing the decimal number by 16 taking note of the result and the remainder.

ii. divide the result obtained in (i) by 16 and take note of the new result and the remainder.

iii. repeat steps i and ii until the result is 0.

iv. the result is a combination of the remainders starting from the last.

16 | 596

16 | 37 r 4

16 | 2 r 5

    | 0 r 2

Now combine the remainders starting from the bottom up. i.e

254₁₆

Therefore, (596)₁₀= ( 254)₁₆

(c) convert ( 101011101)₂ = ( )₁₆

This means that (101011101)₂ be converted to base 16 (hexadecimal).

To convert from binary to hexadecimal,

i. starting from the rightmost bit, group the binary digits into a group of 4 bits as follows

101011101 => 1   0101    1101

ii. the group that does not contain 4 bits is padded with 0s

101011101 => 0001   0101    1101

iii. using the hexadecimal table, convert each group to hexadecimal as follows.

0001 = 1

0101 = 5

1101 = D

iv. combine the result

15D

Therefore, ( 101011101)₂ = ( 15D)₁₆

(d)  convert(37)₁₀= ( )₂

This means that (37)₁₀ be converted to base 2 (binary).

To convert from decimal to binary,

i. start by dividing the decimal number by 2 taking note of the result and the remainder.

ii. divide the result obtained in (i) by 2 and take note of the new result and the remainder.

iii. repeat steps i and ii until the result is 0.

iv. the result is a combination of the remainders starting from the last.

2 | 37

2 | 18 r 1

2 | 9 r 0

2 | 4 r 1

2 | 2 r 0

2 | 1 r 0

  | 0 r 1

Now combine the remainders starting from the bottom up. i.e

100101₂

Therefore, (37)₁₀= ( 100101)₂

What are the main dimensions of information system and their components

Answers

Answer:

The dimensions of information systems include organizations, management, and information technology. The key elements of an organization are its people, structure, business processes, politics, and culture. An organization coordinates work through a structured hierarchy and formal standard operating procedures.

3. Why is human resource plan made​

Answers

Answer: See explanation

Explanation:

Human Resource Planning refers to the process whereby the future human resource requirements of an organization is predicted and how the current human resources that the organization has can be used to fulfill the goals.

Human resources planning is made as it's useful helping an organization meet its future demands by supplying the organization with the appropriate people.

Human resource planning also allows organizations plan ahead in order to have a steady supply of effective and skilled employees. It also brings about efficient utilization of resources. Lastly, it leads to better productivity and organizational goals will be achieved.

Implement a class named MyArrayList that extends class the java.util. ArrayList. The class MyArrayList overrides the add(obj) method in the following way: it adds obj into the list if the object does not occur in the list or it occurs in the list only once; otherwise, if the object occurs in the list more than once, then the method does nothing.

Answers

Answer:

import java.util.ArrayList;

import java.util.Collections;

public class MyArrayList<T> extends ArrayList<T> {

 public boolean add(T obj) {

   if (Collections.frequency(this, obj) < 2) {

     return super.add(obj);

   }

   return false;

 }

}

Explanation:

According to the requirement, an element with the same value can occur at most twice in the list.

The Collections.frequency utility is useful to count the occurrances.

Sure, here's an implementation of the `MyArrayList` class that extends `java.util.ArrayList` and overrides the `add` method as described:

```java

import java.util.ArrayList;

import java.util.HashMap;

import java.util.Map;

public class MyArrayList<E> extends ArrayList<E> {

   "ATTHERATE"Override

   public boolean add(E obj) {

       // Count occurrences of each element in the list

       Map<E, Integer> countMap = new HashMap<>();

       for (E element : this) {

           countMap.put(element, countMap.getOrDefault(element, 0) + 1);

       }

       // Check if obj occurs in the list only once or not at all

       if (!countMap.containsKey(obj) || countMap.get(obj) == 1) {

           return super.add(obj);

       }

       // If obj occurs more than once, do nothing

       return false;

   }

}

```

In this implementation, the `add` method first counts the occurrences of each element in the list using a `HashMap`.

Then, it checks whether the given object `obj` occurs only once or not at all in the list. If so, it adds the object to the list using the `super.add(obj)` call.

If `obj` occurs more than once, the method does nothing by returning `false`. This way, the `MyArrayList` class ensures that duplicates are added only once, or not at all, as required.

Know more about java:

https://brainly.com/question/12978370

#SPJ5

Complete the steps for adding a recurring event.

1. Click
.

2. Then, choose
.

3. Enter the necessary details, and click
.

4. Specify the recurrence details.

Answers

Answer:

which type of questions is this

write a java program to input the corresponding data to print the result of the following expression
y=ax²+bx+c

Answers

Answer:

The program in Java is as follows:

import java.util.Scanner;

public class Main{

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

 float a, b, c, x, y;

 a = input.nextFloat();

 b = input.nextFloat();

 c = input.nextFloat();

 x = input.nextFloat();

 y = a * x * x + b * x + c;

 System.out.print(y); }}

Explanation:

This declares all variables

 float a, b, c, x, y;

The next 4 lines get input for a, b, c and x

 a = input.nextFloat();

 b = input.nextFloat();

 c = input.nextFloat();

 x = input.nextFloat();

This calculates the value of y using [tex]y = ax^2 + bx + c[/tex]

[tex]y = a * x * x + b * x + c;[/tex]

This prints the calculated value of y

 System.out.print(y);

Write a program that receives a filename as user input. The file is structured as multiple lines containing numbers separated by a single space. For example, this would be an acceptable file:

Answers

Answer:

The solution in Python is as follows:

filename = input("File: ")

fll = open(filename, "r")

for line in fll:

for i in line.split():

 print(i,end='\t')

print()

Explanation:

The complete question implies that the program reads a file and displays the file content in a structured way (tabs or spaces)

The explanation is as follows:

This gets input for the file name

filename = input("File: ")

This opens the file for read operation

fll = open(filename, "r")

This iterates through the lines of the file

for line in fll:

This iterates through each line (splitted by space)

for i in line.split():

This prints the current element followed by a tab

 print(i,end='\t')

This starts printing on another line

print()

People who know about phones, what do you think about the phone "Samsung Galaxy A21s"?

Answers

Answer:

iphone is better but if u like it then ok

Explanation:

The most serious security threat to Bluetooth-enabled devices is ____, which occurs when a hacker gains access to the device and its functions without the owner's consent.

Answers

The most serious security threat to Bluetooth-enabled devices is [tex]\sf\purple{bluebugging}[/tex], which occurs when a hacker gains access to the device and its functions without the owner's consent.

[tex]\large\mathfrak{{\pmb{\underline{\orange{Happy\:learning }}{\orange{.}}}}}[/tex]

Produce a program using a loop that requests for 8 floating point numbers from a user.once provided the program should calculate the average of all numbers that are less than 10.5

Answers

Answer:

The program in Python is as follows:

total = 0

count = 0

for i in range(8):

   num = float(input())

   if num < 10.5:

       total+=num

       count+=1

print("Average: ",total/count)

Explanation:

This initializes the total to 0

total = 0

This initializes the count to 0

count = 0

This loop is executed 8 times

for i in range(8):

This request for float number

   num = float(input())

If input is less than 10.5

   if num < 10.5:

The sum is taken

       total+=num

And count is incremented by 1

       count+=1

The loop ends here

This calculates and prints the average

print("Average: ",total/count)

Using only AND, OR and inverter gates to implement the above Boolean equation, how many gates are needed

Answers

Answer: hello your question has some missing data attached below is the missing data

answer : 10 gates

Explanation:

Logic diagram Using only AND, OR and inverter gates

x = A ⊕ B ⊕ C

attached below is the require Logic diagram Using only AND, OR and inverter gates .

number of inputs > 2

number of gates needed = 10

I need solutions to below questions with python code:
Write a program, my_family.py For Loop A program, work-list.pyList
1. that contains a Tuple holding the names of friends or family members. Then use a For Loop to read and print the names.
2. that contains a of six integers. Use a list method to add one more integer. Use a list method to sort the list. Use a While Loop to print the entries.

Answers

Answer:

1) my_family.py

family = ('Dad', 'Mom', 'Agnes', 'David', 'Chris', 'Millie')

for name in range(len(family)):

   print(family[name])

2) work_list.py

my_number = [2, 6, 3, 1, 8, 4]

# add items at the end of the list.

my_number.append(0)

my_number.append(5)

# sorts the list, default - ascending.

my_number.sort()

size = 0

while size < len(my_number):

   print(my_number[size])

   size += 1

Explanation:

The tuple and list data structures are ordered, using indexes to locate items in its container.

The family.py file uses the for-loop to iterate and print the family names in the tuple.

The work-list.py file contains a list of integers which is modified by adding items at the end of the list with the append method and a prints all the items using a while-loop.

how you plan to deal with stress?

Answers

I plan to deal with stress by distracting my self in what I do with my daily life. One way to deal with stress is by listening to music or exercising. Both of these are distractions and help keep things off your mind.

Which of the following answer choices best describes the algorithmic purpose of method num?

/** Precondition: i==0; */

public static int num(int[] ray, int i)
{
if( i >= ray.length ){
return 0;
}
if( ray[i] % 2 != 0 ){
return 1 + num( ray, i+1 );
}
else{
return 0 + num( ray, i+1 );
}
}

a. The method is counting the number of numbers in ray.
b. The method is counting the number of even numbers in ray.
c. The method is counting the number of occurrences of x in ray.
d. The method is counting the number of odd numbers in ray.
e. The method is summing all of the numbers in ray.

Answers

Answer:

d.

Explanation:

It is a recursive function that returns the number of odd numbers in ray starting at index i and above.

The depth of the recursion is equal to the length of ray.

17. Which of the following keyboard shortcut is used to copy the selected text?
a. Ctrl+c
b. Ctrl+V
c. Ctrl+X
d. Ctrl+Z​

Answers

Answer:

ctrl+c is used to copy the selected text

Answer:

A. Ctrl+c

Explanation:

I took the test, also you can use Command c and Command v to copy and paste.

Identify at least three tips you would give to people to stay safe on the Internet so that their information stays secure. Explain why these tips are useful.

Answers

Answer:

1. Do not give away personal information such as your address, school you go to, or anything like that (obvious reasons

2. Do not share your passwords because people can hack into your things

3. Don't make guessable passwords such as Cookies, ILovePizza, Money

1. Never give out your address, phone number, school name, etc.
This can lead to so many bad things. To protect yourself and others around you, don’t share your personal information to people you don’t know or trust.

2. Don’t add people on social media that you don’t know. I know a lot of people have public accounts and I’m not saying thats bad, but I am saying that you need to be careful on who’s adding you. There are a lot of creepy people out there.

3. Never open links people send you. If someone sends you a link online, it’s best to not open it. This opens up a whole new world for creeps to mess with you. They can track you, give you a virus or viruses. Never open random links that random people send you.

UNIX inodes are an example of an indexed file allocation scheme. What levels of indexing were they designed to support. A. Direct B. Single indirect C. Double indirect D. Triple indirect E. All of the above are supported by UNIX inodes.

Answers

Answer: E. All of the above are supported by UNIX inodes

Explanation:

An inode refers to the data structure that's in the UNIX operating systems which consists of vital information that has to do with the files that's within a file system.

It should be niteec that when there's creation of a file system in UNIX, then a set amount of inodes will be created too.

The levels of indexing that the UNIX inodes were designed to support include the direct, single indirect, double indirect and the triple indirect. Therefore, the correct option is E.

Sum-of-minterms form is a _____. a. compact function notation that represents each literal by a number b. product term having exactly one literal for every function variable c. variable appearance in an expression in true or complemented form d. canonical form of a Boolean equation where the right-side expression is a sum-of-products

Answers

Answer: D. canonical form of a Boolean equation where the right-side expression is a sum-of-products

Explanation:

Sum-of-minterms form is refered to as the canonical form of a Boolean equation such that the right-side expression is the sum-of-products.

It should be noted that the minterms whose sum helps in defining the Boolean function will be the ones that give the 1's with regards to the functions in the truth table.

Can you think of other businesses that might benefit from using voice response this system?​

Answers

Answer:

call centers benfit big in this field

Explanation:

A _____ virus uses the language of an application that records a sequence of keystrokes and instructions in an application, such as word processing or spreadsheet, to hide virus code.

Answers

Answer: macro virus

Explanation:

The virus that uses virus uses the language of an application which is vital in recording the sequence of the keystrokes and the instructions in an application, like spreadsheet or the word processing in order to hide virus code is the macro virus.

A macro virus is simply a computer virus which is written in same macro language that is being used for software programs. When a software application is being infected by the macro virus, it leads to a sequence of actions which automatically start when the application is being opened.

Which of the following describes an iteration in a computer program?

Answers

Answer:

a set of instructions that can be run multiple times throughout a program

Explanation:

Suppose a class Car and its subclass Honda both have a method called speed as part of the class definition. rentalH refers to an object of the type Honda and the following statements are found in the code: rentalh.cost(); super.speed(); what will the first statement do?
A. Nothing will be called since the code will not compile as a result of multiple definitions of speed.
B. The cost method in Car will be called.
C. The cost method in Honda will be called.
D. Overloading will be used to determine which cost method to use.

Answers

Answer:

C. The cost method in Honda will be called.

Explanation:

The first statement will cause the cost method in Honda to be called. This is because rentalh is a object of the subclass Honda. Therefore, any method that is called using this object variable will target the elements within the Honda subclass. In this case, the cost() method is being called using the rentalh variable which will look for the cost() method within the scope of the Honda subclass. In order to target the parent class Car it would need to be called using the super variable as in statement 2.

Other Questions
Match each tool with how we used it in class what is the value of u ? There are 29 students in Mrs. Dixon's science class. On the last test, only 1 student earned the median score of 84.How many students scored an 84 or lower?A - 15b - 14C - 13D - 12 Uceeding to our lesson in this modulo, let us check your prarfor this jesson, Angwer the questions inai Foliow on a separuia sineluiWaper. Choose the letter of your answer.4991. What is the branch of mathematics that deals with the collection, organization,presentation, analysis, and interpretation of data?A. AlgebraC. StatisticsB. GeometryD. Trigonometry2. Which of the following is a complete collection of all elements to be studlod?A. CensusC. SampleB. PopulationD. Statistics3. Which of the following is a subset of a population that will serve as arepresentative of the whole population?A. CensusC. SampleB. PopulationD. Statistics When a tree is cut down, does the amount of carbon inside the tree stay the same, increase or decrease? Why is Katsuyori a weak leader in samurais tale? identify and name the functionalpresent in (i) C H (ii). CH CHOH. please help me i really need help CUANTOS CAMBIOS PUEDE REALIZARSE EN UN POARTIDO? One angle of an isosceles triangle measures 90. Which other angles could be in that isosceles triangle? Choose all that apply. 45, 65, 30,15. improving writing exam answers 17.What is the voice of the following sentence?We were left by the teacher to figure out how to do the math homework.A. activeB. passive In the given figure, which angle is complementary to Find the mean of the following data set: 8.9, 7.2, 3.3, 2.5, 9.4, 3.9, 4.5, 5.4, 8.9 Where does haemoglobin become oxyhaemoglobin? Answer the following questions to say what happened, according to each picture.Alberto, qu le hiciste a tu dedo? One page reflection on what you learned this year. (Proportional relationships, equivalent expressions, surface area, volume, probability, etc...)Optional1 page, 12 size font, double spaced A short-term savings strategy is usually designed to:A. maximize the growth of money used for investments.B. make sure a person has money available in an emergency.C. increase the income a person earns by having a job.D. allow a person to spend nearly all of the money he or she makes.SUBMIT University of Florida researchers in the Department of Materials Science and Engineering have invented a technique that rapidly detects traces of TNT (Today, Spring 2005). The method, which involves shining a laser on a potentially contaminated object, provides instantaneous results and gives no false positives. In this application, a false positive would occur if the laser detected traces of TNT when, in fact, no TNT were actually present on the object. Let A be the event that the laser light detects traces of TNT. Let B be the event that the object contains no traces of TNT. The probability of a false positive is 0. Required:Write this probability in terms of A and B using symbols such as U, and |. What is the vertical shift of this sinusoidal function?question is in pic pls help asap :)