1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xxTIMURxx [149]
3 years ago
6

Which microsoft operating system started the process of authenticating users with a user name and password?

Computers and Technology
1 answer:
11111nata11111 [884]3 years ago
5 0
It should be either windows 98 or windows xp but I think it is windows xp
You might be interested in
I'm asking more questions for help with schoolwork, thank you for the help, giving Brainliest.
r-ruslan [8.4K]
Give them brainliest!
4 0
3 years ago
What permissions are needed in order to use a work online that is in the public domain?
Maurinko [17]
<h2 /><h2>⇒Written  \: permission  \: from \\  the  \: creator</h2>

The term “public domain” refers to creative materials that are not protected by intellectual property laws such as copyright, trademark, or patent laws. ... Anyone can use a public domain work without obtaining permission, but no one can ever own it.

5 0
3 years ago
If you have a database with birthdates, and you would like to find everyone who was born before June 16, 1967, what would you en
Tcecarenko [31]

Answer:

<June 16,1967

Explanation:

7 0
4 years ago
Read 2 more answers
15. Select the correct answer.
givi [52]

Answer:

Pixel dimensions

Explanation:

measure of height and width of a image in pixels

3 0
3 years ago
What can amber do to make sure no one else can access her document?
Lelu [443]

Answer:

Amber needs to run with the document and hide it in a safe place so no one else can access her document:)

7 0
4 years ago
Read 2 more answers
Other questions:
  • The decimal system was invented by the ____ empire.
    14·1 answer
  • What is predictive dialing?
    12·1 answer
  • A key requirement for the process of testing hypotheses in the scientific method is Group of answer choices experimenter bias. c
    9·1 answer
  • Write a python program to calculate the average of two numbers​
    8·1 answer
  • Please help meh T^T Which of the following describes an application error? Select 2 options.
    5·2 answers
  • What are the main features cyber law of Nepal​
    13·1 answer
  • How to create diagram that demonstrates the step<br> by step procedures in performing a mail merge.
    12·1 answer
  • What is the output of this program?
    10·2 answers
  • Which is the correct code to declare a catch-all handler?
    13·1 answer
  • An Inspect and Adapt (I&amp;A) event is occurring and a program is trying to address a long-existing problem (WIP)?"unreliable P
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!