1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nikolay [14]
3 years ago
6

Windows enables each user to establish a ____, which identifies to windows the resources, such as apps and storage locations, a

user can access when working with the computer.​
a. ​user account
b. ​log-in account
c. ​log-in name
d. ​user name
Computers and Technology
1 answer:
BlackZzzverrR [31]3 years ago
3 0
The answer is A. User account.

Hope this helped!

Please mark brainliest answer ;D


You might be interested in
​_______ consists of the analysis​ tools, technologies, and processes by which marketers dig out meaningful patterns in big data
Salsk061 [2.6K]
I think it's value chain analysis.
7 0
3 years ago
I need help RIGHT NOW!!!!!!!!!!!!!!!!
Semenov [28]
Professionals use computers for many things, for example, to store their information. It might be hard to keep up or to find the information they need when printed on paper. So they just copy the information and put it into their computers, where they can just type in a keyword and then they quickly the information they need.

Hope This Helps!
4 0
3 years ago
What’s considered the brain of a computer?
Colt1911 [192]

Answer: The computer brain is a microprocessor called the central processing unit (CPU).

Explanation:

The CPU is a chip containing millions of tiny transistors. It's the CPU's job to perform the calculations necessary to make the computer work -- the transistors in the CPU manipulate the data.

5 0
4 years ago
Read 2 more answers
The purpose of the ________ protocol is to ensure the integrity of the communication.
Vladimir [108]

The purpose of the transmission control protocol is to ensure the integrity of the communication.

The TCP/IP network architecture also refers to the Internet architecture. The Transmission Control Protocol (TCP) is a transport layer protocol, and the Internet Protocol (IP) is a network layer protocol.

<h3>What is Transmission control protocol ?</h3>

Transmission Control Protocol, or TCP, is a communications standard that enables computer hardware and software to exchange messages over a network. It is intended to send packets over the internet and make sure that data and messages are successfully delivered through networks.

  • TCP's (Transmission Control Protocol) purpose is to regulate data transport so that it is dependable. Connection management, dependability, flow control, and congestion control are the four fundamental TCP functions. Connection initialization (a three-way handshake) and termination are included in connection management.

Learn more about Transmission control protocol here:

brainly.com/question/14280351

#SPJ4

3 0
2 years ago
You’re investigating an internal policy violation when you find an e-mail about a serious assault for which a police report need
Rasek [7]

The email specifying who in your company you need to talk to first and what evidence must be turned over to the police is written below.

The manager,

Robotics Plc.

Dear sir,

<h3>Issue of  internal policy violation</h3>

I wish to bring to your notice an issue of concern that has occurred in the company. All employees are mandated to work for the growth of the company and when things or due protocol are not being followed, it can bring an organization down.

I wish to bring to your notice an issue of  internal policy violation  that was done by Mr. Yusuf Thomas on December 2021 that has cost the company to loss about 2million dollars. He used the companies money and also took some of the companies client for himself.

He is still working and no sanction or steps have been taken to reprimand him. I wish that the issue be solved so that others will not follow the same steps.

Thanks and waiting for quick response.

Mary Gina.

Learn more about policy violation from

brainly.com/question/13198827

#SPJ1

6 0
2 years ago
Other questions:
  • What commands will reset a network interface in Linux?
    13·1 answer
  • write the structure of an email message ques.2 what do you mean by search engine? write its component .ques. 3 what are the adva
    9·1 answer
  • Which of the following is considered part of the process in the systems thinking example of a TPS?
    6·1 answer
  • Which tool should be used when a fastener, such as a lug nut, is extremely tight
    6·2 answers
  • write a pay-raise program that requests a person's first name, last name, and current annual salary, and then displays the perso
    6·1 answer
  • Which of the following is an object such as a field which can be inserted into a document
    7·1 answer
  • How do you chose a profile pic on brainly?
    8·1 answer
  • Raman will perform in pune tomorrow(simple past)​
    11·2 answers
  • Help me code game plz just comment below for more info
    10·2 answers
  • Sergio has been asked to make a set of data that was once restricted now available to any users. What data type will Sergio appl
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!