1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
r-ruslan [8.4K]
3 years ago
6

What’s my password for this app

Computers and Technology
2 answers:
FrozenT [24]3 years ago
7 0

Answer:

I guess there isnt any password!

Explanation:

Sloan [31]3 years ago
5 0
Brother are you ok, we can talk if your not
You might be interested in
The linux and macos program traceroute is known by a slightly different name on windows. it's referred to as ______.
kompoz [17]

The answer is 'tracert'. Tracert or traceroute command is a form of a diagnostic tool which allows you to capture information as the packet is sent from the source and destination providing the route taken and measure of delay across the IP network.

7 0
3 years ago
Keeping in mind the role the order of precedence plays in equations, what would Excel display as the result of the following equ
Arlecino [84]
Keeping in mind the role the order of precedence plays in equations, what would Excel display as the result of the following equation?

=(24+75)/(6*3)
=99/18
= 5.5
18)99.0.
90.0
9.0

D. 5.5



6 0
3 years ago
You are part of the team to implement new software at XYZ Inc. The employees at XYZ Inc. trust the results of the old software p
sasho [114]

Answer:

Option (D) i.e., Parallel start up is correct option to the following question.

Explanation:

Parallel startup is also an application or software or a way of using the application of the other Operating System in others just like that the following XYZ inc. has trust on older platform but their system give them cautions for update then they use parallel set up by which they also use old software, as well as they, use the Mac's software in Windows. This strategy provides both the option of usage.

8 0
3 years ago
What must you be careful of when retrieving messages/data from mobile devices in public?
pochemuha

We must be careful of when retrieving messages/data from mobile devices in public because of Bluebugging.    It is a form of attack through the use of Bluetooth.  It is more than just Bluesnarling and Bluejacking.  It goes beyond, allowing the thieves to take control of a device.

7 0
3 years ago
Acrynom for wys or wyg
REY [17]
What you said? And what you get?
8 0
3 years ago
Other questions:
  • The computer mouse is used to
    7·1 answer
  • What are the first two lines of defense a company should take when addressing security risks?
    10·1 answer
  • Indenting the start and finish of segments
    8·2 answers
  • The most fundamental components of storage that users interact with are the:
    11·1 answer
  • When parking on hills or an unlevel surface, make sure your_____is
    15·2 answers
  • Select the correct answer.
    10·2 answers
  • Which describes the first step a crawler-based search engine uses to find information?
    10·2 answers
  • Which peripheral device is used to record sound?
    14·2 answers
  • Importance of computer education​
    9·1 answer
  • It specifies the amount of memory needed to store data.
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!