1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wariber [46]
3 years ago
7

How are a members details be checked and verified when they return to log back in to the website ?

Computers and Technology
1 answer:
aksik [14]3 years ago
6 0

Answer:

When you sign into a website, you have to enter a password and username most of the time, which will allow the website to know that you have checked in and it is you, who is using your account.

You might be interested in
Consider the eight bit signed binary number 1110 0101. Convert it to signed decimal from assuming the signed binary number is re
alukav5142 [94]

Answer:    -26

Explanation:

We have:  1 1 1 0   0 1 0 1

Since it’s one’s complement representation, then we check the very first digit to state if the number is negative or positive. Since the very first digit to the left is 1, then the number will be negative.

When it is negative, we now flip the bits, so that we get:

0 0 0 1   1 0 1 0

Notice we just turn the 1’s into 0’s and vice versa.

We now convert this binary into decimal:

We assign to each digit the corresponding power of 2.  

See it in a table:

\begin{matrix}0&0&0&1&1&0&1&0\\2^7&2^6&2^5&2^4&2^3&2^2&2^1&2^0 \end{matrix}

Then multiplying each digit by its corresponding power of 2 and then adding the results, we get:

2^4+2^3+2^1

We get:

16+8+2=26

Since we stated that the number is negative, then, the final result is: -26

4 0
3 years ago
Which type of evidence should victims collect to help officials catch cyber bullies
iren [92.7K]

Answer:

How you get cyberbullied just look away from the screen -Tyler The Creator

Explanation:

3 0
4 years ago
Read 2 more answers
What is the best way to prevent the most common cause of network failure?
Goryan [66]
Upgrade routers and servers annually.
8 0
3 years ago
Read 2 more answers
Heelp my brainly stuff says i am 49 but im 11 how to fix?X??
stich3 [128]

Make another account. But u cant get into brainly unless u r over 26 or something.

6 0
3 years ago
Alex recently earned his security certification and has been offered a promotion to a position that requires him to analyze and
nikitadnepr [17]

Alex recently earned his security certification and has been offered a promotion to a position that requires him to analyze and design security solutions as well as identifying users’ needs.Alex been offered

A.Security administrator

Explanation:

  • A security systems administrator handles all aspects of information security and protects the virtual data resources of a company.
  • They are responsible for desktop, mobile, and network security, and are also responsible for installing, administering and troubleshooting an organization's security solutions.
  • A security administrator is the point person for a cybersecurity team.
  • A Security Administrator installs, administers, and troubleshoots an organization's security solutions.
  • The Security Administrator will ensure the network's security, protect against unauthorized access, modification, or destruction, and troubleshoot any access problems

3 0
4 years ago
Other questions:
  • 1. Create a view named customer_addresses that shows the shipping and billing addresses for each customer.
    15·1 answer
  • Dialogue is not a characteristic of functional text because
    9·1 answer
  • Which of the following government debt instruments has the longest maturity?
    5·1 answer
  • Word processing software programs can run on smartphones.<br> True<br> Or <br> False
    6·1 answer
  • Identify and describe the four fundamental configurations that are the basis of most Windows printer deployments and describe ho
    11·1 answer
  • The following code in a different program is not working properly.The message should display the value of the intCounter variabl
    11·1 answer
  • Which of the following players is on offence
    9·1 answer
  • Select the correct term to complete the sentence.
    7·1 answer
  • Hadley made a plan that after downloading the Eclipse IDE, she would disable her security program, extract and install Eclipse,
    10·1 answer
  • In the 1760s and early 1770s, the British government wanted to raise money by taxing the residents of its colonies in North Amer
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!