Security companies regularly create and publish lists of the most frequently used passwords. They create these lists based on data they have examined from millions of passwords that have been stolen by hackers. Lists of the most frequently used passwords in recent years can be found in the following table:
Decide whether the following statements are true or false:
It is better not to use any of the passwords in the table.
The password 1q2w3e4r can be considered secure.
If a security company requires our password in order to create such a list, it is appropriate to provide it to them.