1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wariber [46]
3 years ago
7

How are a members details be checked and verified when they return to log back in to the website ?

Computers and Technology
1 answer:
aksik [14]3 years ago
6 0

Answer:

When you sign into a website, you have to enter a password and username most of the time, which will allow the website to know that you have checked in and it is you, who is using your account.

You might be interested in
The rotor in a shaded pole motor consists of
DedPeter [7]

The rotor in a shaded pole motor consists of a permanent magnet


I hope that's help:0

5 0
4 years ago
Taday is the anniversary of September 11, 2001. you were to meet the child of a victim or survivor of 9/11, what would you say t
Vlad1618 [11]

Answer:

Hi How's you day

Explanation:

7 0
4 years ago
The ____ documents a system at the end of the design phase, identifies any changes since the beginning of the project, and inclu
nekit [7.7K]

Answer:

allocated baseline

Explanation:

The allocated baseline documents a system at the end of the design phase, identifies any changes since the beginning of the project, and includes testing and verification of all system requirements and features.

Hope this helps!

5 0
3 years ago
Read 2 more answers
Open a command prompt on PC1. Issue the command to display the IPv6 settings. Based on the output, would you expect PC1 to be ab
Strike441 [17]

Answer:

yes it can communicate with all interfaces on the router.

Explanation:

PC1 has the right default gateway and is using the link-local address on R1. All connected networks are on the routing table.

Netsh may be a Windows command wont to display and modify the network configuration of a currently running local or remote computer. These activities will tell you in how manny ways we can use the netsh command to configure IPv6 settings.

To use this command :

1. Open prompt .

2. Use ipconfig to display IP address information. Observe the  output whether IPv6 is enabled, you ought to see one or more IPv6 addresses. A typical Windows 7 computer features a Link-local IPv6 Address, an ISATAP tunnel adapter with media disconnected, and a Teredo tunnel adapter. Link-local addresses begin with fe80::/10. ISATAP addresses are specific link-local addresses.  

3. Type netsh interface ipv6 show interfaces and press Enter. note the output listing the interfaces on which IPv6 is enabled. Note that each one netsh parameters could also be abbreviated, as long because the abbreviation may be a unique parameter. netsh interface ipv6 show interfaces could also be entered as netsh  ipv6 sh i.

4. Type netsh interface ipv6 show addresses  Observe the results  of the interface IPv6 addresses.

5. Type netsh interface ipv6 show destinationcache and press Enter. Observe the output of recent IPv6 destinations.

6. Type netsh interface ipv6 show dnsservers and press Enter. Observe the results listing IPv6 DNS server settings.

7. Type netsh interface ipv6 show neighbors and press Enter. Observe the results listing IPv6 neighbors. this is often almost like the IPv4 ARP cache.

8. Type netsh interface ipv6 show route and press Enter. Observe the results listing IPv6 route information.

5 0
3 years ago
Which is considered the best way to secure a laptop to a desk in a workplace?
Lorico [155]

Answer:

Lock it in a safe is the best way to secure a  laptop to a  desk in a work space.

Explanation:

Since the end user feels that a laptop can be stolen or taken by others is a safe way to keep hire or her laptop in a  safe place.

Bolt  it:-  it is  not possible, because there   is  no   option available

Lock  it is safe:- this  is  idle or best  solution is  safe his or her laptop

Use an alarm :- the person   who steals the laptop will be more intelligent and he or she knows how to disable the alarm system.

Use  cable lock;- it is easy to remove it.

3 0
3 years ago
Other questions:
  • The part you should check first when you are servicing a sparking universal motor is the A. commutator. B. armature. C. brushes.
    9·1 answer
  • What is the most common concern with using variable frequency drives?
    6·1 answer
  • Routing protocols that enable routers to communicate beyond neighboring routers, allowing each router to independently map the n
    7·1 answer
  • In filmmaking, who is ultimately responsible for the creative process?
    15·1 answer
  • Write a compound inequality that is represented by the graph.
    14·1 answer
  • A computer essentially takes input, processes it, and produces output. Which person developed a machine in the mid-1880s that ac
    6·1 answer
  • It is not important to type '=' before a formula or a function
    12·1 answer
  • Two character strings may have many common substrings. Substrings are required to be contiguous in the original string. For exam
    7·1 answer
  • What is the easiest way to defeat ganon in BOTW?
    11·2 answers
  • Plz help
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!