1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rasek [7]
3 years ago
8

Access to a computer can be controlled using a ____ password.

Computers and Technology
1 answer:
slamgirl [31]3 years ago
8 0
Yes it can be control by a USER ( administrator and having a MASTER password) 
You might be interested in
Give me 3 facts and 3 opinions
zzz [600]

Hello!

I assume you mean 3 facts about computer/technology based things.

Fact: Certain computers are built for video games, where others are not.

Opinion: All computers suck when trying to use video games.

Fact: Not all computers are made for multiple purposes.

Opinion: All good computers are made by apple.

Fact: You can plug in certain things such as keyboards or a mouse, but not all computers have this.

Opinion: Only good computers have built in keyboards and a mouse.

3 0
3 years ago
A company is looking for an employee to assign passwords to all of its
d1i1m1o1n [39]

Answer:

B. Information security analysis.

Explanation:

8 0
2 years ago
If a friend changes the password on your phone how do you get into it if you dont know the password
kotegsom [21]
Ask your friend to tell you the password
3 0
3 years ago
. What process skill would a scientist use to find the length of a line
Brilliant_brown [7]

Answer:

Explanation:

A ruler

;););););););););););););););)

7 0
3 years ago
What is the abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages, many of which contain hoax
Ilya [14]

I think the answer is spam
5 0
2 years ago
Other questions:
  • A(n) ________ is a variable that receives an argument that is passed into a function. global argument scope parameter
    15·1 answer
  • Think about some of the most memorable and forgettable games ever created. They can be games that were
    15·1 answer
  • A label control may be added to a form by double-clicking on the Label control icon in the ________ window.
    15·1 answer
  • A network administrator determines who may access network resources by assigning users
    10·1 answer
  • .... . .-.. .-.. --- .-.-.-<br><br><br> TRANSLATE THAT.
    10·1 answer
  • There is a file of a few Sean Connery movies on the internet. Each entry has the following form:
    9·1 answer
  • What is the main difference between a peripheral device and other types of devices? Choose the best answer.
    12·1 answer
  • k-means clustering cannot be used to perform hierarchical clustering as it requires k (number of clusters) as an input parameter
    15·1 answer
  • A network consists of 75 workstations and three servers. The workstations are currently connected to the network with 100 Mbps s
    12·1 answer
  • Describe the method used by operating systems to differentiate between TCP connections.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!