1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xxTIMURxx [149]
3 years ago
6

Which microsoft operating system started the process of authenticating users with a user name and password?

Computers and Technology
1 answer:
11111nata11111 [884]3 years ago
5 0
It should be either windows 98 or windows xp but I think it is windows xp
You might be interested in
A presentation has bullet points that move. The presenter wants to use these bullet points in several other places in the presen
goldenfox [79]

Answer: Animation Painter.

In Microsoft Powerpoint, the most common method would be to simply animate each bullet point in the entire presentation. The Animation Painter is a tool that has been included to copy all the animations of a single object and apply them to another object selected.

How to use:

  1. Select the object with the animations already applied to.
  2. Click on the Animation Painter.
  3. Select the object that you would like to apply the animations to.
  4. Done.
6 0
3 years ago
What is malware? What are some signs that malware may be impacting the performance of your computer? How can you avoid malware?
Anni [7]

Answer:

Malware is a type of software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system. Malware can be spread through email attachments, online advertisements, websites, and other methods.

Some signs that malware may be impacting the performance of your computer include:

  • Your computer is running more slowly than usual
  • Your computer crashes frequently
  • Your computer has pop-up ads or other unwanted behavior
  • Your default homepage or search engine has changed without your permission
  • You see new icons or programs on your desktop that you didn't install

To avoid malware, you should be cautious when browsing the internet and avoid visiting suspicious websites. You should also avoid opening email attachments from unknown senders, and be wary of online advertisements. You can also protect your computer by using antivirus software and keeping it up to date.

3 0
1 year ago
you want to implement a protocol on your network that allows computers to find the ip address of a host from a logical name. whi
aniked [119]

The protocol that should be implemented is that one needs to enable hosts on the network to find the IP address.

<h3>What is IP address?</h3>

It should be noted that IP address simply means a unique address that defines a device on the internet.

In this case, the protocol that should be implemented is that one needs to enable hosts on the network to find the IP address.

Learn more about IP address on:

brainly.com/question/24930846

#SPJ12

7 0
1 year ago
An idea concerning what will happen in the future. (Crossword)
dangina [55]

Answer:

<h2>Expectation </h2>

Explanation:

Expectation is  an idea concerning what will happen in the future

7 0
3 years ago
Computer security experts devote their time and energy to the protection of sensitive data and the prevention of an outside atta
Alik [6]

Answer:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

Explanation:

Information security policy are used for the prevention of intruders hacking a network when an organization start getting IT related attacks.

An information security policy are set of rules/policies designed to guide employees for the protection of the security of company information and IT systems. The reasons for these policies are:

  1. It defines what is required from organization’s employees for the security of the IT systems
  2. Information security policies provide a means to secure the organization against external and internal threats
  3. Information security policies are a mechanism to for ensuring an organization’s legal and ethical responsibilities
  4. Information security policies are created to hold each employee responsible with regard to information security
4 0
3 years ago
Other questions:
  • Adam discovers a virus on his system that is using encryption to modify itself. the virus escapes detection by signature-based a
    14·1 answer
  • Which business filing process puts documents or data in the order by date? a. Linear
    7·1 answer
  • Located toward the right of the status bar and contains buttons for zooming the display in and out
    13·1 answer
  • On a wireless router, what gives out IP addresses?<br> DHCP<br> DNS<br> WPA<br> WPS
    7·1 answer
  • Upon looking out at the
    8·2 answers
  • Methods that require you to use an object to call them are called ____ methods.1. accessor
    7·1 answer
  • A workstation with a static IP (Internet Protocol) address can print and authenticate to a server, but cannot browse to www.comp
    14·1 answer
  • How can your network be infected with malware or ransomware?
    6·1 answer
  • Which is the best choice to explain why a human resource manager is so
    5·1 answer
  • If a TextView has not been displayed yet, it is possible to retrieve measurements about its width and height using the _________
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!