1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andrej [43]
2 years ago
12

When activating windows, which type of volume activation is used to activate multiple windows systems, but must be individually

activated with microsoft using an internet connection or by telephone?
Computers and Technology
1 answer:
andrew11 [14]2 years ago
4 0

The answer is MAK. It is also known as Multiple Activation Key. MAK activates systems on a one-time basis, using Microsoft's hosted activation services. Each MAK key is a good for a specific number of device activation. MAK keys are not the default model for Volume Activation clients, so users will have to request MAK keys from the Volume Licensing website if they want to use this model.

You might be interested in
Four ways to improve the performance of a hard disk include.
erik [133]

Answer:

Defragmenting, and optimizing, also on Windows to not use Paging unless you have an SSD. And to install a lightweight OS like Windows 11 super-lite, Linux etc.

7 0
1 year ago
Write a function: function solution(N); that, given a positive integer N, prints the consecutive numbers from 1 to N, each on a
koban [17]

Answer:

<em>The program written in Python is as follows:</em>

def solution(N):

     concat = ""

     for i in range(1,N+1):

           if not(i%2 == 0 or i%3 ==0 or i%5 == 0):

                 print(str(i))

           else:

                 if i%2 == 0:

                       concat= concat+"Codility"

                 if i%3 == 0:

                       concat= concat+"Testers"

                 if i%5 == 0:

                       concat= concat+"Coders"

                 print(concat)

                 concat = ""

N = int(input("Enter a positive integer: "))

solution(N)

Explanation:

This line declares the function

def solution(N):

This line initializes a variable named concat to an empty string

     concat = ""

This line iterates from 1 to the input integer

     for i in range(1,N+1):

<em>This line checks if the current number of iteration is divisible by 2,3 or 5, if no, the number is printed</em>

           if not(i%2 == 0 or i%3 ==0 or i%5 == 0):

                 print(str(i))

<em>If otherwise</em>

           else:

<em>This lines checks if current number is divisible by 2; if yes the string "Codility" is concatenated to string concat</em>

                 if i%2 == 0:

                       concat= concat+"Codility"

<em>This lines checks if current number is divisible by 3; if yes the string "Testers" is concatenated to string concat</em>

<em>                 </em> if i%3 == 0:

                       concat= concat+"Testers"

<em>This lines checks if current number is divisible by 2; if yes the string "Coders" is concatenated to string concat</em>

                 if i%5 == 0:

                       concat= concat+"Coders"

<em>The concatenated string is printed using this line</em>

                 print(concat)

This variable concat is intialized back to an empty string

                 concat = ""

The main method starts here

N = int(input("Enter a positive integer: "))

This line calls the defined function solution

solution(N)

6 0
3 years ago
Do you know how i can text my mom (and tell my mom to tell dad) that i want to get a new phone and get my ipad back without it b
posledela

You can clean your room, do chores without being told, and being nice to your siblings, or being very helpful around your house. I don't have social media myself, but from what I know, you just have to follow the directions correctly on the site or ask a friend. Plze mark me brainiest:) Hopefully this was helpful:)

7 0
2 years ago
Which of the following enable unauthorized access to your network, and by extension, the sensitive documents, proprietary code,
oksano4ka [1.4K]

Answer:

(a) Weak passwords

Explanation:

Typically, a password is weak if it is easily discovered by all persons including unauthorized users. When passwords to a network are weak, the network is vulnerable to unauthorized access and may permit access to proprietary code, accounting files and other sensitive documents in the network.

Examples of weak passwords are;

i. those generated from the name of a user.

ii. those generated for a user by default.

iii. those generated from words from dictionary or other similar materials.

iv. those that don't include a combination of letters and numbers and even symbols.

v. those that are short in length e.g less than 8 characters.

3 0
3 years ago
Read 2 more answers
What is the first step in setting up a good team at work?
Tatiana [17]

Answer:

set goals

Explanation:

6 0
3 years ago
Other questions:
  • Philip is thinking about customizing his motorcycle. A paint job, saddlebags, and a radio would cost $600. His motorcycle is old
    15·2 answers
  • PLEASE HELP ASAP!!!
    15·2 answers
  • What is the safest way to install a new flash drive
    7·2 answers
  • Which are characteristics of an effective solution? Choose all that apply. solves the problem in anticipated ways each time resu
    5·1 answer
  • How will Mario know which words are misspelled in his document?
    11·2 answers
  • Describe FIVE distinct features of multi-threaded programming. Your answer should be language independent. g
    9·1 answer
  • I figured out the secret message in Dad feels good, I can connect the dots
    8·1 answer
  • Help! Picture provided
    7·2 answers
  • If wearing protective gloves, there's no need to wash your hands after exposure to blood.
    14·1 answer
  • A server is handling thousands of simultaneous connections, and proxying requests to another service. Which concurrency model is
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!