1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katrin [286]
3 years ago
3

If you want to protect your computer so that it requires a password when resuming from a screen saver in Windows 7 in which of t

he following locations will you find this feature
Computers and Technology
2 answers:
maksim [4K]3 years ago
8 0

Answer:

Start menu -> Control panel -> Users Account -> Change your windows password -> Make changes to your user account -> set a password -> new password -> confirm new password -> OK -> OK

Explanation:

Step 1 -  Click on start menu.

Step 2 - Select the <em>control panel</em>.

Step 3 - Go to <em>Users account</em> in control panel. If prompted a dialog box, click <em>continue</em>.

Step 4 - Select <em>Change your windows password</em> option.

Step 5 - Go to <em>Make changes to your user account</em> option.

Step 6 - Under that option select <em>set new password</em> option.

Step 7 - Enter new password under option <em>New password</em>.

Step 8 - Enter password again under the option <em>Confirm new password</em>.

Step 9 - Then click <em>OK</em> and again <em>OK</em> option.

jolli1 [7]3 years ago
7 0

Press the windows key, type change screen saver, then press enter. A screensaver window will pop up and then check the box "On resume, display logon screen". Done! Hope this helps :)

You might be interested in
In both direct flooding attacks and _____ the use of spoofed source addresses results in response packets being scattered across
Natali5045456 [20]

Answer:

SYN spoofing attacks.    

Explanation:

The Spoofing attack is used to access the personal information it is distributed the  viruses through infected links or file .The spoofing attacks has redistributed the traffic and the flow control in the denial-of-service attacks.

The SYN spoofing attacks is used the spoofed source in the result of giving response to packet The Spoofing attack  is distributed  across the Internet also it is detectable

6 0
3 years ago
Effective collaboration requires a proactive and holistic strategy that integrates business goals and technology potential.
givi [52]

Answer:

a) true

Explanation:

Effective collaboration is a form of business organization strategy that is utilized by various firms, which is based on carrying out better collaborative or synergy software and proposes a visionary and holistic technique that incorporates company objectives and technology capability.

Hence, in this case, it is TRUE that effective collaboration requires a proactive and holistic strategy that integrates business goals and technology potential.

5 0
4 years ago
Spelling and grammar checking options can be controlled at the word options dialog box. To display this dialog box, begin by cli
Cerrena [4.2K]
By clicking the file tab
8 0
4 years ago
You're programming an infinite loop. What must you include in your code to prevent crashes?
natta225 [31]

You have to put repeat

4 0
3 years ago
Read 2 more answers
Juan has performed a search on his inbox and would like to ensure that the results only include those items with
lubasha [3.4K]

Answer:

The Refine command group

Explanation:

8 0
3 years ago
Other questions:
  • Which description best explains a placeholder?
    7·1 answer
  • Why is personal responsibility important when considering technology?​
    14·2 answers
  • Tim is creating a page to display his poker club’s set of rules. He has main categories and subcategories along with about a par
    12·1 answer
  • Which student's strategy likely found the most academic success?
    6·1 answer
  • Does anyone know what edmodo is? If you do please tell me what it is and what you do on edmodo.
    15·1 answer
  • What does "scanf(\"%d\" mean?
    13·2 answers
  • What Is entered into the system as input?
    13·1 answer
  • 2.20 Write an expression involving a three-letter string s that evaluates to a string whose characters are the characters of s i
    6·1 answer
  • Can someone please give me Python test 3 it would help me tremendously
    5·1 answer
  • Darla is going to start writing the HTML code for a web page. What would she start with?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!