1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xxTIMURxx [149]
3 years ago
6

Which microsoft operating system started the process of authenticating users with a user name and password?

Computers and Technology
1 answer:
11111nata11111 [884]3 years ago
5 0
It should be either windows 98 or windows xp but I think it is windows xp
You might be interested in
Which of the following is a new feature in Windows Server 2016 that enables block-level data replication to occur automatically
Inessa [10]

Answer:

Option C is the correct answer for the above question

Explanation:

  • The storage replica is a new advantage that is used in the 2016 version of the windows server. It is a feature which is very useful for the user point of view, because of it more secure the data transfer on the internet.
  • It is used to block the duplicate data, by which the storage space is left for the other data and the data will secure when it stores on the server.
  • The above question asked about the features which are a new advantage of the 2016 version and provide block facilities for the duplicate data which is storage Replica which is defined above.
  • Hence the correct option is C, while the other is not because others is not a feature to block the duplicate data.
7 0
3 years ago
Assume that a bool variable workedovertime has been declared , and that an int variable hoursworked has been declared and initia
Anton [14]
Workedovertime = ( hoursworked > 40 ) ? true : false;
4 0
4 years ago
In cell M2, enter a formula using a nested IF function as follows to determine first if a student has already been elected to of
aleksley [76]

Answer:

Following are the code to this question:

code:

=IF(EXACT(I2,"Yes"),"Elected",IF(EXACT(K2,"Yes"),"Yes","No"))

Explanation:

In the given the data is not defined so we explain only  the above code, but before that, we briefly define working of if the function that can be defined as follows:

  • The If() function, is used only when one of the logical functions and its value must return the value true. or we can say it only return a true value.
  • In the above function, a column "Elected" is used that uses other column values to check this column value is equal if this condition is true it will return "yes" value.

8 0
3 years ago
Thad found a website for his research about the U.S. Constitution. Which of the following is a clue that the source may not be r
vazorg [7]
<span>D. The information comes from the Library of Congress since its a official page </span>
8 0
3 years ago
Read 2 more answers
Which of the following is a function of an audio programmer?
olchik [2.2K]

Answer:function of audio programmer

1. The audio programmer at a game development studio works under to integrate sound into the game and write code to manipulate and trigger audio cues like sound effects and background music.

6 0
4 years ago
Other questions:
  • Only the _________ can add users with passwords and limit user access to selected areas.
    5·1 answer
  • A certain programming language uses 4-bit binary sequences to represent nonnegative integers. For example, the binary sequence 0
    9·1 answer
  • Assume that the main method of the class named Welcome does not contain any compile-time errors. What is the name of the file ge
    11·1 answer
  • Design a 4-to-16 line Decoder by using the two 3*8 decoder-line decoders. The 3-to-8 line decoders have an enable input ( '1' =e
    13·1 answer
  • Translate function f into RISC-V assembly language. Assume the function declaration for g is int g(int a, int b). e code for fun
    10·1 answer
  • What should you remember about typography while creating your résumé?
    5·1 answer
  • A co-worker is called away for a short errand and leave the clinical PC logged onto the Confidential Information System. You nee
    9·1 answer
  • Write pseudo code that performs the following: Ask a user to enter a number. If the
    13·1 answer
  • Calvin is creating a 3D shell of a turtle. He is creating a sculpted, intricate design for the pattern he wants on the shell, bu
    10·1 answer
  • personalization allows customers to modify the standard offering, such as selecting a different home page to be displayed each t
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!