1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elan Coil [88]
3 years ago
7

What is pin number i can use to unlock and Android

Computers and Technology
2 answers:
alex41 [277]3 years ago
8 0
<span>What is pin number i can use to unlock and Android if you want to do it, give me brainliest answer and then message me private

</span>
katen-ka-za [31]3 years ago
6 0
Use your own birthday number or a secrete number that u like
You might be interested in
Who is known as the father of computer? ​
juin [17]

Answer:

Charles babbage ok my boy

8 0
3 years ago
Read 2 more answers
MARKETING HELP PLEASE?!?!?
azamat
Im late but D should be the one
7 0
3 years ago
Which communication network pattern offers a fairly even flow of information, but two people interact with only one other?
Citrus2011 [14]

Y pattern  communication network presents a fairly even flow of information, but two individuals interact with only one other.

<h3>What is Communication network ?</h3>

A communication network guides how information flows within the organization. Information within an organization typically flows through a system, rather than being a free flow. Communication networks exist as regular patterns of person-to-person connections through which information flows in an organization.

A telecommunications network exists as a group of nodes interconnected by telecommunications links that are utilized to exchange messages between the nodes. The links may utilize a combination of technologies based on the methodologies of circuit switching, message switching, or packet switching, to pass messages and signals.  The common network patterns stand for Vertical Network, Circuit network, Chain network, Wheel network, and Star network.

The Y network lives similarly to the chain except that two members fall outside the chain. In the Y network, for example, members A and B can send data to C, but they can receive information from no one. C and D can exchange information; E can obtain information from D but cannot send any information.

The network exists a communication pattern in which anyone can communicate with anyone else as per their essentials and requirements. In a network, communication reasons are due to physical proximity and organizational structures too. Through the experiment, wheel and Y existed found to be faster than chain and circle.

Hence, Y pattern  communication network presents a fairly even flow of information, but two individuals interact with only one other.

To learn more about Communication network refer to:

brainly.com/question/1637942

#SPJ4

4 0
2 years ago
Can embedded computers automate security so you can lock and unlock doors remotely
garri49 [273]

I guess the correct answer is True

A thiеf must physically stеal yοur cοmputеr tο gain accеss tο its filеs and data. Firеwalls inspеct data transmittеd bеtwееn a cοmputеr and еxtеrnal rеcipiеnts tο prеvеnt unsοlicitеd data еxchangеs. An еmbеddеd cοmputеr can autοmatе sеcurity sο yοu can lοck and unlοck dοοrs rеmοtеly.

5 0
4 years ago
A group of users can perform certain operations on a shared workbook. Which option helps them to update and track changes in the
irina1246 [14]

The “Allow changes by more than one user at the same time” option.


In a group of users, it is very important to create a shared workbook so that several people are able to update information and track changes in the workbook at the same time. To do so, one should click on the review tab of the excel sheet and select share workbook. On the editing tab of the share workbook dialog box, select the Allow changes by more than one user at the same time check box. Go ahead and click the advanced tab and select option you would want to use and then click OK

 






4 0
3 years ago
Other questions:
  • Which of the following experiences is considered a simulation?
    12·1 answer
  • Some touch screens recognize when you touch the screen with two fingers or two hands. If you are looking for a device on which y
    11·1 answer
  • Which line of code will print Python is cool! on the screen?
    9·2 answers
  • Which feature of a website takes you to a different part of the website or a totally different website when you click on it?
    12·2 answers
  • The blank is the area on your screen where you can access the tab and menu options for word
    5·1 answer
  • RFID tagging is an IoT technology that allows assets to be tracked using electromagnetic fields to automatically identify tagged
    10·1 answer
  • Logan has developed an excellent presentation with interesting content. He received great feedback on the evaluation
    10·1 answer
  • State three advantage and disadvantages of Laser printer ​
    7·1 answer
  • Jolly 4 pls link in description
    7·1 answer
  • 1. In platform construction, wall-framing members include sole plates,
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!