1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ehidna [41]
3 years ago
13

What password did the boss gave to the man?

Computers and Technology
2 answers:
lapo4ka [179]3 years ago
7 0

Answer:

1947

Explanation:

because i dont know

Tresset [83]3 years ago
7 0

Answer:

where is the password?

Explanation:

You might be interested in
What are some other ways to program a robot to navigate a complicated environment other than straight paths and right angle (90
In-s [12.5K]

Answer:

The most popular method of robot programming is probably the teach pendant. ... To program the robot, the operator moves it from point-to-point, using the buttons on the pendant to move it around and save each position individually. When the whole program has been learned, the robot can play back the points at full speed.

8 0
3 years ago
Read 2 more answers
Lost passwords set for documents in Microsoft® Word® documents can be retrieved in the backstage view. True False
Nat2105 [25]

Answer:

True

Explanation:

Hope this helped!

3 0
3 years ago
Read 2 more answers
Which tab would you click to access the autosum feature?
Bogdan [553]
On Excel, you click the Formulas tab. 

6 0
3 years ago
To avoid potential documentary errors and security leaks, the configuration of firewalls should not be documented unless strictl
Zolol [24]

Answer: False

Explanation:

 The given statement is false, as the configuration of the firewall, operational and administration procedure must be documented.

The configuration of multiple firewall are identical and the integrity and also performance of the configuration firewall files are check on the regularly bases.

It is basically used to avoid the security leaks and the documentation errors so it is necessary that it should be check regularly so that it can easily implement without any interrupt occurrence.

8 0
3 years ago
When can screen tips be useful
Vikki [24]
Whenever honestly , what subject is this for?
6 0
4 years ago
Read 2 more answers
Other questions:
  • Lena has secured her online website, which sells fashion apparel. She has taken all the necessary steps by making her website PS
    8·1 answer
  • Give the Linux bash pipelined command that would take the output of the "cat /etc/passwd" command (that lists the contents of th
    5·1 answer
  • What is the name of Louis and Auguste Lumiere's invention that incorporated a camera, a printer, and a project all in one machin
    8·1 answer
  • We can include following item(s) during configuration itemidentification:
    10·1 answer
  • Who invented pascaline and when?​
    11·2 answers
  • Which device do engineers use to drive a system of gears?
    15·2 answers
  • Excel creates which type of cell references in formulas by default?
    5·1 answer
  • Which of these is not enumerated as a motivation to create accessible web content?
    10·1 answer
  • ______ requires that any electronic communication must be backed up and secured with reasonable disaster recovery infrastructure
    6·1 answer
  • State two skills to be used to access information from the internet in order to avoid unwanted materials.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!