Describe the advantages and disadvantages of password generator software. Would you recommend the use of such software for your own system

Answers

Answer 1

Answer:

he various advantages that can be associated with a password generator software are as follows: Any arbitrary long password can be generated using the complete set of symbols and not just a subset (usually the subset which is easier to type on a key

Explanation:


Related Questions

buying a good computer you should consider what?​

Answers

I recommend a Samsung or Chromebook both good conputers

CASE STUDY # 1
WELCOME TO MOBILE BANKING
Discussion Questions
1. Would you be comfortable using mobile banking for transferring funds, paying bills, and checking
balances? Why or why not?
2. How might mobile banking attract the attention of hackers? Are the precautions discussed in this
article enough to keep hackers at bay?

Answers

Answer:

1 would you be comfortalbe

A user tries to open a movie in Windows Media Player but no image is displayed and only audio plays Which software must be installed on the computer?​

Answers

There are software that are often installed in systems for audio player. The software must be installed on the computer is Codec.

Codec is simply refered to as a short form for the word coder-decoder. It is known as an algorithm that is often used when encoding data. Example an audio or video clip.

The encoded data is often decoded as it is played back.

It act by limiting the size of media file and it also increases the processing power that is needed to play the file back correctly.

Learn more from

https://brainly.com/question/14338673

In many businesses, it is common to have a key card style access control to get in and out of the building or into other sections of the building. What major benefit does this type of centralized access control system offer that simple locks and keys cannot

Answers

Answer:

identification of who is entering the building

Explanation:

The key benefit  of centralized access control system that simple locks and keys cannot offer is to:

Maintain Security of your Sites. Identify people entering or going out of firm.What major benefit does a centralized access control system have?

The key benefit over key style is:

Maintain Security of your Sites.

Note that is said to be the highest benefit of a building access system as it is aim to properly aid or secure a remote sites.

The key benefit  of centralized access control system that simple locks and keys cannot offer is to:

Maintain Security of your Sites. Identify people entering or going out of firm.

Learn more about key card style from

https://brainly.com/question/25533998

#SPJ6

Describe three things (risks) that can cause damage to computer hardware​

Answers

Phishing,computer viruses,malware/ransomeware,rogue security software,denial of service attacks etc

1. Give one reason why data is represented in binary in a computer [1]
2. How many bits in a byte? [1]
3. How many bytes are there in a MB? Include your working.

Answers

Answer:

1) Computers use voltages and since voltages changes often, no specific voltage is set for each number in the decimal system. For this reason, binary is measured as a two-state system i.e. on or off. Also, to keep calculations simple and convert into binary online, computers use the binary number system

2) 8 bits

3) 1000000 bytes

Why is it important to keep software up to date? Select 3 answers that are correct.
A.) fix bugs

B.) download malware

C.) add features

D. ) limit personal use

E. ) patch security holes

Answers

Answer:

It is important to keep your software up because (A) it fixes bugs, (C) adds features, and (E), it patches your security holes.

To put it in short, your answers is A, C, and E.

I hope this helped at all.

lol easy dont need to use brainly its a,c,d

You have been elected to assist the school's yearbook committee and newspaper club in purchasing new computers. The current computers for both organizations are located in the school's secondary computer
lab. Your job is to help students understand how to use the new computers that were purchased.

Which stage of the computer life cycle are your duties associated with?
A) Deploying computers
B) Retiring computers
C) Supporting and upgrading
D) planning for and purchasing equipment

Answers

Answer:

A) Deploying computers

Explanation:

Just took the quiz :)

While discussing the testing procedures for relays, Technician A says that if a relay does not
click or activate a circuit it is intended to operate, it can be comprehensively tested using a
voltmeter, test light, or ohmmeter. Technician B says that electronic relay testers do not
require a voltage source. Who is correct?
Select one:
O a. Technician A only
O b. Technician B only
O c. Both Technician A and Technician B
O d. Neither Technician A nor Technician B

Answers

Answer:

Socratic app

Explanation:

it will help you

Answer C is correct
Hope this helped <33

안녕 또 나야 난 너에게 미래의 메시지를 전하러 왔어 01100011 01101111 01101101 01101111 00100000 01111001 00100000 01101100 01101111 00100000 01101101 01100101 01101110 01110011 01101001 01101111 01101110 01100101 00100000 01101100 01100101 01110011 00100000 01110100 01110010 01101001 01100111 01101111 00100000 01110101 01101110 00100000 01101101 01100101 01101110 01110011 01100001 01101010 01100101 00100000 01100100 01100101 01101100 00100000 01100110 01110101 01110100 01110101 01110010 01101111 00100000 01110110 01100101 01101110 01100111 01101111 00100000 01100100 01100101 01101100 00100000 01100001 11000011 10110001 01101111 00100000 00110010 00110000 00110011 00110000 00100000 01110011 01101111 01101100 01101111 00100000 01110110 01101001 01101110 01100101 00100000 01100001 00100000 01100001 01100100 01110110 01100101 01110010 01110100 01101001 01110010 01101100 01100101 01110011 00100000 01110011 01101111 01100010 01110010 01100101 00100000 01101100 01100001 00100000 01100100 01100101 01110110 01100001 01110011 01110100 01100001 01100011 01101001 01101111 01101110 00100000 01100100 01100101 01101100 00100000 01110000 01101100 01100001 01101110 01100101 01110100 01100001 00100000 01110011 01101111 01100010 01110010 00100000 01100101 01101100 00100000 01100011 01101111 01110110 01101001 01100100 00100000 00110001 00111001 00100000 01110011 01100101 00100000 01100001 01100011 01100001 01100010 01101111 00100000 01100101 01101110 00100000 01100101 01101100 00100000 01100001 11000011 10110001 01101111 00100000 00110010 00110000 00110010 00110011 00100000 01100101 01110011 01100101 00100000 01100101 01110011 00100000 01101101 01101001 00100000 01101101 01100101 01101110 01110011 01100001 01101010 01100101 00100000 01110000 01100001 01111010

Answers

Answer:

i think its 01100001

Explanation:

미래에서 온 메시지를 전하려는 경우 코로나가 종료되면 알려주십시오.

Choose a project with a relatively simple description (e.g. building a LAN,
designing a business web page, inventing a new communication device,
etc.). Describe your project scope in 100 words and then identify at least
five significant varied risks associated with the project. Be sure that at
least one of them is a positive risk

Answers

Answer:

Design a web page

Explanation:

It is easier html is a very easy language to learn css it should take ou about a week for a solid website

Write a statement that inserts the value 'wash dog' into the list activities so that it becomes the element at index 2.

Answers

I don't have much context on it or what programming language you want so...

activities[2] = 'wash dog'

Evaluate the expression using stack 14-(6-10)-10

Answers

Answer:

14 -(6-10)-10

14-(-4)-10

18-10

= 8

Devices on one network can communicate with devices on another network via,
1)Multiplexer
2)Printer
3)Router
4)Hub

Answers

It is option 4 a hub cuz that is what it is used for

Answer:

3

Explanation:

evaluate the following expression using stack 14-(6-10)-10

Answers

Simplify the expression.
8

The output of the expression using stack 14-(6-10)-10 is known to be  8.

What is a stack calculator?

The Mine craft stack calculator is used for the above process. It helps to tell a person the amount of stacks of an item that a person is known to have with a specific total number of items.

Note that the The output of the expression using stack 14-(6-10)-10 is known to be  8 as it correct.

Learn more about expression from

https://brainly.com/question/723406

#SPJ2

Where to store
ammunition

Answers

In gun shops of course. and in basements

Synthesize (15 points)
Determine the practical steps for delivering a presentation, and apply the principles
of good communication to a slide presentation. Critique the style of two different
presentations shown on the second page of this activity.
1. Delivering a successful presentation is difficult, and often it comes down to the
details. Watch Video A, which is on the second page of this activity. List three things
you think this presenter is doing successfully
2. Watch Video B. Compare the two presenters and identify two things this presenter
could do better.

Answers

Answer:

Perfection: When you make a mistake, no one cares but you.

Even the most accomplished public speaker will make a mistake at some point. Just keep in mind that you’ll notice more than anyone in your audience. The most important thing you can do after making a mistake during a presentation is to keep going. Don’t stop and—unless the mistake was truly earth shattering—never apologize to the audience for a minor slip. Unless they are reading the speech during your delivery, the audience won’t know if you left out a word, said the wrong name, or skipped a page. Because “to err is human,” a mistake can work for you, because it allows you to connect with your audience. People don’t want to hear from someone who is “perfect;” they will relate much more easily to someone who is real.

Master the art of public speaking and crush your next presentation with one of our public speaking seminars, available online and in a classic classroom format.

Effective Executive Speaking

Take your public speaking to the next level! Speak, present and communicate with poise, power and persuasion.

Visualization: If you can see it, you can speak it.

Winners in all aspects of life have this in common: they practice visualization to achieve their goals. Sales people envision themselves closing the deal; executives picture themselves developing new ventures; athletes close their eyes and imagine themselves making that basket, hitting that home run, or breaking that record.

The same is true in public speaking. If you’ve read “10 Powerful Body Language Tips” then you know how anxiety can impact presentation skills. The best way to fight anxiety and to become a more comfortable speaker is to practice in the one place where no one else can see you—your mind. If you visualize on a consistent basis, you’ll prepare your mind for the prospect of speaking in public, and pretty soon you’ll conquer any feelings of anxiety.

Discipline: Practice makes perfectly good.

Your goal is not to be a perfect public speaker. There is no such thing. Your goal is to be an effective public speaker. Like anything else in life, it takes practice to improve those public speaking skills. We too often take communication for granted because we speak to people everyday. But when your prosperity is directly linked to how well you perform in front a group, you need to give the task the same attention as if you were a professional athlete. Remember, even world champion athletes practice every day. Try taking a class where you practice giving speeches.

How does an organization comply with data-usage clauses within data protection regulations such as GDPR or the Data Protection Act?

Answers

Answer:

How does an organization comply with data security clauses in data protection regulations such as GDPR or the Data Protection Act? ... By ensuring all data storage is publicly accessible to guarantee fairness. By only sharing collected personal data with partners and third-party channels.

How can the information from a phr be shared

Answers

Answer:

Patients can decide whether to share their information with providers, family members or anyone else involved in their care. Patients can access their records in a tethered PHR through a secure portal.

Patients can decide whether to share their information with providers, family members or anyone else involved in their care. In some cases, a stand-alone PHR can also accept data from external sources, such as laboratories or providers.

Write a statement that slices a substring out of the string quote and puts it into a variable named selection. If given the string 'The only impossible journey is the one you never begin.', selection should contain 'possible jou' after your statement executes.

Answers

The statements that slices a substring out of the string quote and puts it into a variable named selection is as follows:

text = "The only impossible journey is the one you never begin."

selection = ""

selection += text[11:23]

print(selection)

The code is written in python.

The string is stored in a variable called text.

The variable selection is declared as an empty string. The purpose is to store our new substring.

The third line of the code is used to cut the string from the 11th index to the 23rd index(excluding the 23rd index) and add it to the declared variable selection.

Finally, we output the variable selection by using the print statement.

The bolded values in the code are python keywords.

read more; https://brainly.com/question/20361395?referrer=searchResults

Which one of the following careers is the most highly resistant to economic change?

Video Game Designers

Airline Pilots

Fashion Designers

Funeral Attendants

Answers

Answer:

Video game designers bbbbbbbbbbbbb

what is the difference b\w computer science and IT

Answers

Answer:

IT involves working both with hardware e.g CPUs, RAM, hard disks and software e.g mobile application. While

computer science deals with the development and testing of software and software systems.

Match the Tools with the name of the tool.


Toolbar Options


Question 1 options:


Increase Indent



Line Spacing



Decrease Indent



Justify Text



Bullet Points



Center Text


1


2


3


4.


5


6

Answers

Answer:

1. Center Text

2. Justify Text

3. Bullet Points

4. Decrease Indent

5. Increase Indent

6. Line Spacing

Hope this helps:)

1. Briefly summarize the similarities and differences among temporary staffing firms, employee leasing organizations, and professional employment organizations. Which approach pro- vides an organization the most protection from potential coemployment situations?

Answers

A staffing firm simply refers to an organization that matches companies and job candidates. It's also known as a recruiting firm.

It should be noted that employers use staffing agencies to help recruit candidates for them and to fill certain job openings.

An employee leasing organization furnishes workers to another client on a long-term basis. It's usually a contractual agreement between the parties that are involved.

A professional employer organization simply means an organization that enters into a joint employer relationship with another employer by leasing employees to the employer.

The organization that typically gives protection from potential coemployment situations is the temporary staffing firms.

Read related link on:

https://brainly.com/question/25747300

2. PJM Bank has a head office based in Bangalore and a large number of branches nationwide. The
headoffice and brances communicate using Internet. Give two features of Internet.

Answers

Answer:

Two features of the internet are that internet is a collection of computers which help in the sharing of information.

Most of the home users of internet make use of cable or phone modem, or a DSL connection in order to connect the internet.

Computers that save all of these web pages are referred to as the web servers.

Explanation:

1. most of the home users of internet make use of cable aur phone modern or a DSL connection in order to conduct the internet .

2. computers that save all of these web pages are referred to as the web servers.

(Hope this helps can I pls have brainlist (crown)☺️)

Which operating system might cause the desktop background to change unexpectedly?

A.) boot failure

B.) startup loop

C.) malware

D.) incompatibility

Answers

Answer:

C.) Malware

A boot failure would not load the desktop, same with a startup loop and incompatibility.

What are the tools in creating an animation?

Answers

I will list tools you can use

Flipaclip

Regular a flip book with a pen and lots of paper sheets

I prefer twelve frames per second

and more tools

Capcut

Kinemaster

And search up on your main brower for lots of more info hoped this prepped you up a bit!

Guys did yall get call of duty vanguard yet ​

Answers

Answer:

no not yet

Explanation:

but brainliest me

no not yet soon tho

What is the distinct functionality of WPS writer? (distinct means wala ang functionality na iyon sa ibang word processors :))​

Answers

Answer:

WPS Office' Writer gives you a handful of unique features that can enhance your productivity, such as efficient cloud integration, ability to convert PDF to Word, exporting the document to a picture, picture to text, making backups, inserting watermarks, and more

Works with Windows, Linux, Mac, Android, and iOS, and can also be used directly from a browser

The installer includes other software you can optionally add to your computer, like WPS Spreadsheets and WPS Presentation

Common formatting is allowed, such as organizing data in columns, changing the orientation of the page, aligning text and objects, adding a header and footer, overlaying a watermark, and using heading styles

Encryption is supported, which means when you save a document you can choose a custom encryption type and a unique password for opening the document, and another for modifying it

Problem: A company wants a program that will calculate the weekly paycheck for an employee based on how many hours they worked. For this company, an employee earns $20 an hour for the first 40 hours that they work. The employee earns overtime, $30 an hour, for each hour they work above 40 hours. Example: If an employee works 60 hours in a week, they would earn $20/hr for the first 40 hours. Then they would earn $30/hr for the 20 hours they worked overtime. Therefore, they earned: ($20/hr * 40hrs) + ($30/hr * 20 hrs) = $800 + $600 = $1400 total. For this assignment, you must create pseudocode and a flowchart to design a program that will calculate an employee’s weekly paycheck.

Answers

Answer:

something like that

Explanation:

static bunch of krap main (args) {

    double hours;

    double salary;

    double overSalary;

   print("Enter hours worked: ");

   scan(hours);

    if (hours <= 40) {

       salary = 20 * hours;

    }

    if (hours > 40) {

       overSalary = 30 * (hours - 40);

       salary = 20 * 40 + overSalary;

     }

   

    print(salary);

}

In this exercise we have to use the knowledge of python to write a salary function, as follows:

the code is in the attached image.

In a more easy way we have that the code will be:

static bunch of krap main (args) {

   double hours;

   double salary;

   double overSalary;

  print("Enter hours worked: ");

  scan(hours);

   if (hours <= 40) {

      salary = 20 * hours;

   }

   if (hours > 40) {

      overSalary = 30 * (hours - 40);

      salary = 20 * 40 + overSalary;

    }

   print(salary);

}

See more about python at brainly.com/question/26104476

Other Questions
A FLAG THAT HONORS WAR VETERANS Commonlit PART A: Which statement identifies the central idea of the text?Help I give brain What are the children trying to do on Camazotz?A. find and rescue Mr. MurryB. learn how to tesser on their ownC. return to EarthD. Communicate with Mrs. Murry who was the delegate known as the father of the constitution? What did Russia, a largely Slavic nation, do after Austria-Hungary declared war on the Slavic nation of Serbia? Question 5 options: declare war on Germany pledge to remain neutral prepare to send troops to support Serbia try to negotiate a settlement. Tell what each person needs using verb necesitar and indefinite articles What is the best English translation for speraveram? What New Technologies contributed to or played a role in the Roaring 20s. Give three examples Respiration describes the process that living cells use to release energy by combining sugar and oxygen. The primary chemical changes that happen during respiration are shown in the equation below.C6H12O6 + 6O2 ---> 6CO2 + 6H2O + energyWhich statement correctly compares the reactants and products of the equation? A. The mass of the reactants is less than the mass of the products. B. The mass of the reactants is greater than the mass of the products. C. The mass of the reactants is the same as the mass of the products. D. The number of reactant molecules is greater than the number of products. the shown bellow question answer -8, -11, -14, -17, -20, ...Find the 30th term of this Arithmetic Sequence. Blood in the urine is called Based on her statement, what does Sonia Sotomayor believe? write sentences about your achievements Lincoln's purpose for this passage is to --A) Condemn the Confederate States for secedingB) Unite the nation after the Civil WarC) Explain why he was the best choice for PresidentD) Celebrate the Union's victory The child has diphtheria. Every character has perhaps not acted in a way expected withinsociety. Who the mother, father, doctor, or child has acted in the most repugnant way? If you begin with a saturated solution of sugar dissolved in water, and then you heat the solution, what type of solution will result help fastE explaination If the area of a rectangle is x^2+5x+6, and x represents 15 cm, what is the perimeter of the rectangle? what outsourcing? explain by using an example such as a BPO Help me fast please worth 14