1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Verizon [17]
3 years ago
13

What two different passwords can be set to lock down a computer from unauthorized access?

Computers and Technology
1 answer:
Shalnov [3]3 years ago
3 0

The two different passwords you can use to lock down a computer from unauthorized access would be,

1. The Supervisor password

2. The User Password.

- Mabel <3

You might be interested in
4. Explain the term prejudice. What is an example of prejudice as it relates to parenting?
lara [203]
An unfavorable opinion or feeling formed beforehand or without knowledge, thought, or reason.
2.
any preconceived opinion or feeling, either favorable or unfavorable.
3.
unreasonable feelings, opinions, or attitudes, especially of a hostile nature, regarding an ethnic, racial, social, or religious group.
4.
such attitudes considered collectively:
The war against prejudice is never-ending.
5.
damage or injury; detriment:
a law that operated to the prejudice of the majority.
7 0
4 years ago
How many times would the code in this loop repeat? ____________ for ( j = 0; j &lt; 10; j++ ) { appendItem (myList, aNumber); }
Musya8 [376]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The for-loop given in the question is:

for ( j = 0; j < 10; j++ )

{

      appendItem (myList, aNumber); //this loop append a number to a list myList

}

This loop starts from J variable's value zero and when J's value is less than 10, the loop iterate through its body until J's value becomes greater or equal to 10. As J's value exceed nine, the loop will get terminated.

So this loop repeats 10 times its loop body, at the 11th time, the condition becomes false and the loop will get terminated.

4 0
3 years ago
What is the output produced from the following statements? System.out.println("\"Quotes\""); System.out.println("Slashes \\//");
jekas [21]

Answer:

"Quotes"

Slashes \//

How '"confounding' "\" it is!

Explanation:

The question above is testing your knowledge of  the "\" escape sequence, This escape sequence is used to introduce special formatting to the output of the System.out.print function in Java.

It can be used to introduce a new line \n

It can also be used to introduce a tab indentation \t

As in the question above it is used to introduce double quotes "" in this case \"

Also as we see the question above it can still be used to place backlashes to an output in this case we use two backlashes \\. The first is the escape sequence, the second \ gets printed out.

3 0
3 years ago
When a structure must be passed to a function, we can use pointers to constant data to get the performance of a call by ________
andriy [413]

Answer:

Reference value.

Explanation:

8 0
3 years ago
You are given a 6x8 (6 rows, 8 columns) array of integers, x, already initialized and three integer variables: max, i and j. Wri
Aneli [31]

Answer:

The code is mentioned below.

Explanation:

This code is written in C.

Assuming that an array of 6 by 8 is already initialized and stored in a vector

x[6][8]

which will be called or referred in program by:

x [i] [j]

Alongwith the array the variables i j and max will be initialized as integers.

CODE:

int i,j,max;

max=0;

for(i=0;i<6;i++)

{

for(j=0;j<6;j++)

{

if(max>x[i][j])

max = x[i][j];

}

}

This code will check each and every entry of 6 by 8 array and place the largest value in max.

5 0
3 years ago
Other questions:
  • What is the software called that allows the user to create, access, and manage a database? question 8 options:
    10·1 answer
  • Which of the following variable declarations is a correct assignment?
    14·1 answer
  • Which relationship is possible when two tables share the same primary key? one-to-one one-to-many many-to-one many-to-many
    15·2 answers
  • If Tracy starts on the left edge of the canvas and moves forward 50 pixels, how many times will this code need to be repeated to
    5·1 answer
  • The ________ is responsible for the Internet's domain name system and the allocation of IP addresses.
    12·1 answer
  • Media applications that play audio or video files are part of a class of workkloads called "streaming" workloads (i.e., they bri
    9·1 answer
  • What does cmyk stand for?
    5·2 answers
  • What is sexual intercourse <br><br>​
    13·2 answers
  • RSA encryption relies on
    15·1 answer
  • Twisted copper telephone wire, coaxial copper cable, fiber-optic cable, and media for wireless transmission are all __________.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!