1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katen-ka-za [31]
3 years ago
12

"If a user on a laptop complains that they are unable to sign into Windows even though they are certain they are entering the co

rrect password, what should you have them do?"
Computers and Technology
1 answer:
Tresset [83]3 years ago
8 0

Answer:

The best way is to reset the password.

Explanation:

User can reset the Windows password by following the steps as below:

  1. Visit the Microsoft Recover Account website
  2. There will be three options given and user can simply pick "I know my password but can't log in"
  3. User shall see the password recovery page. User can input email address or Skype ID linked to the Microsoft account.
  4. If user has security info on their account, Microsoft will send a one-time code to the email registered with the Windows. Once the code is keyed in, user can create a new password.

You might be interested in
7. A patent is an example of a rare and valuable resource. Indicate whether the statement is true or false and also justify it.
mamaluj [8]

Answer:

True.

Explanation:

Patent can be defined as the exclusive or sole right granted to an inventor by a sovereign authority such as a government, which enables him or her to manufacture, use, or sell an invention for a specific period of time.

Generally, patents are used on innovation for products that are manufactured through the application of various technologies.

Basically, the three (3) main ways to protect an intellectual property is to employ the use of trademarks, copyright and patents.

Hence, a patent is an example of a rare and valuable resource because it protects the intellectual property of an individual or business entity and as such serves as a medium for gaining royalties or valuable economic benefits.

7 0
3 years ago
The TCP congestion control measure techniques fall into two categories: retransmission timer management and ________ management
Paladinen [302]

Answer:

Window management

Explanation:

In TCP congestion control, aside from retransmission timer management, the other category of technique is called WINDOW MANAGEMENT: this is carried out by the sender to end a link between the sender and the receiver to prevent overloading of too much traffic of bytes that can be sent in a given period.

Hence, in this case, the correct answer is WINDOW MANAGEMENT.

7 0
3 years ago
Una pregunta cuales son los ataques de Sindel que por favor y me lo diga gracias
Len [333]
I do not know spanish please say in english
5 0
3 years ago
1. The precious metals needed to make computer chips, graphic cards, and transistors are found in only a small population of cou
dexar [7]

Answer:

it means that they can charge companies to come mine it making them more wealthy they can also upscale the materials needed to make it as they are the only countries that sell it so they have no one to compete with

3 0
3 years ago
Draw a flow chart except the principle, time and date from the user. and display the simple interest and amount as output.​
timama [110]

Answer:

See attachment for flowchart

Explanation:

The explanation is as follows

1. Start

2. Get input for principal, time and rate

3. Calculate Interest using Interest = Principal * Rate * Time/100

4. Print Interest

5. Stop

7 0
3 years ago
Other questions:
  • Explain how abstraction is used in a GPS system
    12·2 answers
  • When a process becomes digital, it often becomes cheaper and the workflow becomes simpler. True False
    5·2 answers
  • What is Napoleon's friend's full name? From the Napoleon Dynamite movie.
    9·2 answers
  • Suppose you have one particular application that is trying to send data on the Internet but none of the data is making it to the
    15·2 answers
  • ____ is the security guarantee that people who intercept messages cannot read them. A. Availability B. Encryption C. Confidentia
    9·1 answer
  • Identify an advantage of working in teams.
    8·1 answer
  • Which of the following contains hardware systems similar to the affected organization but does not host live data?
    13·1 answer
  • Which protocol is used to send web pages from a web server to a web browser?
    13·1 answer
  • Which of the following statements comparing debit cards to credit cards is TRUE?
    13·2 answers
  • Hamilton is the best
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!