1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AnnyKZ [126]
3 years ago
14

What microsoft operating systems started the process of authenticating using password and username

Computers and Technology
1 answer:
katovenus [111]3 years ago
5 0
<span>What Microsoft operating systems started the process of authenticating using password and username? SYSTEM32!

01000110 01110101 01100011 01101011 00100000 01011001 01101111 01110101                          <===TRANLSATE ME</span>

You might be interested in
1. It defines the amount of white space that appears at the top, bottom, left, and right edge of
LekaFEV [45]

Answer:

Margin is the correct answer to the given question .

Explanation:

The main objective of the margin is to setting the white space that are showing up at the top , bottom, left and the right corners of the file or the document .

Following are steps to setting the white space that are showing up at the top , bottom, left and the right corners of the file or the document

  • Firstly click on the page layout  options  .
  • After that click on the margin tab .In this tab you will given the the top, bottom, left, and right margin according to your need
  • Finally click on ok to finish them .
8 0
3 years ago
__________for about 10 minutes in between each repetition session helps you to remember the information better. a. Reading c. Sl
k0ka [10]

the answer is a.) reading

6 0
3 years ago
Read 2 more answers
You decide to use a packet sniffer to identify the type of traffic sent to a router. You run the packet sniffing software on a d
ycow [4]

Answer:

Promiscuous mode

Explanation:

You decide to use a packet sniffer to identify the type of traffic sent to a router. You run the packet sniffing software on a device connected to the same hub that is connected to the router. When you run the software, you only see frames addresse…

✓ Promiscuous mode

7 0
3 years ago
Give a tight bound on the number of times the z = z + 1 statement is executed. i = 2 while ( i &gt; 1 ) { i = floor(i/2) z = z +
Alinara [238K]

Answer:

zero ( 0) times.

Explanation:

In the code;

i = 2

while ( i > 2){

     i = floor( i/2 );

     z = z + 1;

}

the variable " i " is assigned the integer " 2 ", then the while statement loops with a condition of a greater " i " value and divides the value by two for every loop.

But in this case, the while statement is not executed as the value of " i " which is 2 is not greater than but equal to two.

4 0
3 years ago
A(n) _____ converts the programming instructions written by programmers into a language that the computer understands and proces
qaws [65]

Answer: Translator

Explanation:

each instruction written by programmer in another language must be converted (translated) to machine language in order to process, because computer understand only machine language( 0 and 1). that is translator.

8 0
3 years ago
Other questions:
  • Which company provides the Loki Wi-Fi mapping service?
    10·1 answer
  • The best defenses against covert channels include IDS and intrusion prevention system (IPS) and thoroughly watching all aspects
    15·1 answer
  • The name of a Variable effects its value<br><br> True<br><br> False
    7·1 answer
  • Complete method printPopcornTime(), with int parameter bagOunces, and void return type. If bagOunces is less than 2, print "Too
    5·1 answer
  • etwork behavior analysis system __________ sensors are typically intended for network perimeter use, so they are deployed in clo
    10·1 answer
  • Java public class Odds { public static void main(String[] args) { printOdds(3); printOdds(17/2); int x = 25; printOdds(37 – x +1
    12·1 answer
  • a term to describe article that can be displayed in their entirety as opposed to abstract and reference only?​
    10·1 answer
  • marianne needs to create a version of her slide presentation that does not include all the slides and will be used for a particu
    9·1 answer
  • What is lossless compression
    6·2 answers
  • The discipline of building hardware architectures, operating systems, and specialized algorithms for running a program on a clus
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!