Get premium membership and access questions with answers, video lessons as well as revision papers.
By including many characters in a password
By combining different characters in a password
Use password generator manager.
lemass answered the question on January 20, 2019 at 19:39
- A school intends to install wireless media in their communication system. State three advantages of this model(Solved)
A school intends to install wireless media in their communication system. State three advantages of this model
Date posted: January 20, 2019. Answers (1)
- Explain problems associated with the computer hard disk(Solved)
Explain problems associated with the computer hard disk.
Date posted: January 20, 2019. Answers (1)
- Explain the term proofreading as used in word processing. (2 marks)(Solved)
Explain the term proofreading as used in word processing. (2 marks)
Date posted: January 20, 2019. Answers (1)
- A computer technician has observed a lot of dust on computers in the computer laboratory(Solved)
A computer technician has observed a lot of dust on computers in the computer laboratory.
Date posted: January 20, 2019. Answers (1)
- Describe each of the following computer cables:(a) Parallel cable; (b) Serial cable;(Solved)
Describe each of the following computer cables:
(a) Parallel cable;
(b) Serial cable;
Date posted: January 20, 2019. Answers (1)
- The management of an organisation intends to purchase a printer. State factors that they should consider during the purchase(Solved)
The management of an organisation intends to purchase a printer. State factors that they should consider during the purchase
Date posted: January 20, 2019. Answers (1)
- Differentiate between home page and web page as used in the lnternet(Solved)
Differentiate between home page and web page as used in the lnternet.
Date posted: January 20, 2019. Answers (1)
- State the meaning of the term computer software(Solved)
State the meaning of the term computer software.
Date posted: January 20, 2019. Answers (1)
- State and give examples of the forms of information processed by a computer(Solved)
State and give examples of the forms of information processed by a computer.
Date posted: January 18, 2019. Answers (1)
- Why is a flash disc referred to as hot swapped device?(Solved)
Why is a flash disc referred to as hot swapped device?
Date posted: January 15, 2019. Answers (1)
- Describe four advantages of Top-Down Design method(Solved)
Describe four advantages of Top-Down Design method
Date posted: January 10, 2019. Answers (1)
- Discuss the elements of a Flowchart(Solved)
Discuss the elements of a Flowchart
Date posted: January 10, 2019. Answers (1)
- Define the term flow chart(Solved)
Define the term flow chart
Date posted: January 10, 2019. Answers (1)
- State the properties of an Algorithm(Solved)
State the properties of an Algorithm
Date posted: January 10, 2019. Answers (1)
- Define the term Algorithm as used in computer programming methodology(Solved)
Define the term Algorithm as used in computer programming methodology
Date posted: January 10, 2019. Answers (1)
- The employment of Computers in all spheres of life has done more harm than good. Discuss(Solved)
The employment of Computers in all spheres of life has done more harm than good. Discuss
Date posted: January 3, 2019. Answers (1)
- Advantages that hard disks have over diskettes(Solved)
Advantages that hard disks have over diskettes.
Date posted: January 1, 2019. Answers (1)
- How do you specify the IP address of a computer in a domain?(Solved)
How do you specify the IP address of a computer in a domain?
Date posted: December 24, 2018. Answers (1)
- What is POST?(Solved)
What is POST?
Date posted: December 24, 2018. Answers (1)
- What is a trespass as used in data security and controls?(Solved)
What is a trespass as used in data security and controls?
Date posted: December 24, 2018. Answers (1)