1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Verizon [17]
3 years ago
13

What two different passwords can be set to lock down a computer from unauthorized access?

Computers and Technology
1 answer:
Shalnov [3]3 years ago
3 0

The two different passwords you can use to lock down a computer from unauthorized access would be,

1. The Supervisor password

2. The User Password.

- Mabel <3

You might be interested in
Create a script that prompts for the user to input a directory and then prints out the number of sub-directories in the given di
laila [671]

Answer:

Below is the required code:

Explanation:

Python Code

import os

import bin

dir = input("Please specify the location to the directory")

list = os.walk(dir)

a = length(list[1])

b = length(list[2])

print "Files: %n , Sub-dirs : %n" % (b,a)

decision = _(" Do you want to continue? (y/n) "))

if(decision):

cls

else :

exit()

5 0
3 years ago
What is the name of the the world cell of the internet?​
kipiarov [429]
<h2>Mobile Web</h2>

How you even don't know the basic information

it's disgusting.

3 0
3 years ago
What do you use to put information into a computer?
OlgaM077 [116]
D, D,A,t,C,CA,D,t, D
5 0
3 years ago
Read 2 more answers
20<br>Calculate the kinette energy of a body the speed<br>that will be a mass tragm​
jolli1 [7]

Answer:

20

Explanation:

4 0
3 years ago
What formula would you enter to add the values in cells b4, b5, and b6?
Semenov [28]
=SUM(b4:b6)  If it doesn't show the $ sign just make sure it's in currency :)  I hope this helped!! Good Luck!!! :)
4 0
4 years ago
Other questions:
  • Multiple choice
    9·2 answers
  • Write a Bare Bones program that takes as input a value for X and places 4 times the value of X into the value of Z. The value of
    10·1 answer
  • What is the difference between primary storage, secondary storage and off-line storage?
    5·1 answer
  • When a recursive algorithm terminates its nth instance of the module call, it returns to the point in the ________ instance dire
    11·1 answer
  • Citing Wikipedia as a reference is not considered a good practice because 1.leverages a neutral point of view. 2.hosts unopinion
    8·1 answer
  • How do you refer particular cell?<br>​
    12·1 answer
  • In the previous project, you are storing the first name of the gamer. Write a phrase to the game right before the first word wit
    6·1 answer
  • Enter the word that belongs in the blank:
    13·1 answer
  • Electrical data suitable for transmission is called a(n)
    5·1 answer
  • The storage capacity of Go ogle drive can be increased from ____________.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!