Most networks require their users to use strong passwords. What should be avoided to prevent network intrusion.

What will be an ideal response?

common passwords

Computer Science & Information Technology

You might also like to view...

Use the th element to indicate a table column or row _____.

a. data b. heading c. summary d. caption

Computer Science & Information Technology

A(n) ____ is a collection of an individual’s work accessible through a Web site.

A. wiki B. e-portfolio C. blog D. e-diary

Computer Science & Information Technology