1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rasek [7]
3 years ago
8

Access to a computer can be controlled using a ____ password.

Computers and Technology
1 answer:
slamgirl [31]3 years ago
8 0
Yes it can be control by a USER ( administrator and having a MASTER password) 
You might be interested in
Jason is a computer hardware engineer. His work involves assembling computers. What will Jason need to assemble a microcomputer
d1i1m1o1n [39]
He will need a screw driver with interchangeable bits and a anti-static wrist band (optional)
6 0
3 years ago
Read 2 more answers
This toolbar can be used to change the way the text in your presentation looks. Drawing
jenyasd209 [6]
Most likely formatting

6 0
3 years ago
Read 2 more answers
Hi there. I need to know that if I take computer fundamentals, will that class teach anything about graphic design or digital de
Vedmedyk [2.9K]
Hi there!

I have taken a computer fundamentals class before and they did skim over the topic, but they did not go into depth on it at all. If you really want to learn about that stuff I suggest you find a course that is specifically on that topic or something that is closer related then a general <span>computer fundamentals course.

-Your friend in tech,
</span>ASIAX <span>  </span><span>Frequent Answerer</span>
8 0
3 years ago
A USB flash drive uses solid
steposvetlana [31]
State drive. SSD=Solid State Drive
8 0
3 years ago
TRUE OR FALSE!!<br> Your location can be identified simply by turning on your cell phone..
Tasya [4]

Answer:

this is true

Explanation:

this is true because of the GPS location device built into your phone

3 0
3 years ago
Read 2 more answers
Other questions:
  • Fundamental types of data, such as strings, integers, and real numbers, are known as
    5·1 answer
  • Examples of apps include pop-up windows, validation of webform inpts and images that change when a cursor passes over them
    12·1 answer
  • The Start menu on Windows computers changes based on actions performed by their users. True False
    15·2 answers
  • What are some options available in the Spelling and Grammar Checker in word?
    6·1 answer
  • You are an online training company and stream a lot of training videos from your
    12·1 answer
  • FOR DIGITAL DESIGN/ PHOTOGRAPHY
    5·2 answers
  • Determine the number of character comparisons made by the brute-force algorithm in searching for the pattern GANDHI in the text
    7·1 answer
  • nder a Huffman encoding ofnsymbols with frequenciesf1, f2, . . . , fn, what is the longest a codewordcould possibly be
    13·1 answer
  • Write a program that simulates applying a "boost" to a spaceship in a spaceship race game.
    12·1 answer
  • Print numbers 0, 1, 2, ..., userNum as shown, with each number indented by that number of spaces. For each printed line, print t
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!