1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PSYCHO15rus [73]
3 years ago
9

10. This famous designer’s sister took over his clothing line after his assassination in 1997.

Computers and Technology
1 answer:
rewona [7]3 years ago
8 0

Please find the answers in attached file.

Download docx
You might be interested in
In some networks, the data link layer handles transmission errors by requesting that damaged frames be retransmitted. If the pro
Usimov [2.4K]

Answer:

The answer with explanation is attached in the file.

Explanation:

Download docx
3 0
3 years ago
The CEO of CorpNet.xyz has hired your firm to obtain some passwords for their company. A senior IT network administrator, Oliver
MA_775_DIABLO [31]

Answer:

The olennon account's password: See the attached file for this.

The Administrator account's password: 4Lm87Qde

Explanation:

Note: See the attached excel file for the olennon account's password as I was unable to save it here because I was instead getting the following message:

"Oh no! It seems that your answer contains swearwords. You can't add it!"

The olennon account's password and the Administrator account's password can be found as follows:

To see the rear of the computer, click Back from the menu bar above the computer.

Drag the USB Type A connector for the keyboard from the rear of the computer to another USB port on the machine.

Make sure the keyboard is plugged back in.

Expand System Cases on the shelf.

Add the Laptop to the Workspace by dragging it there.

To see the rear of the laptop, click Back from the menu above the laptop.

Drag the keylogger from the computer to the laptop's USB port.

Select Front from the menu above the laptop to see the front of the laptop.

Select Click to display Windows 10 on the laptop.

Toggle between keylogger and flash drive mode by pressing S + B + K.

To control what occurs with detachable drives, select Tap.

To view files, choose Open folder.

To open the file, double-click LOG.txt.

Select Answer Questions in the top right corner.

Respond to the questions.

Choose Score Lab as the option.

Therefore, we have:

The olennon account's password:

The Administrator account's password: 4Lm87Qde

Download docx
7 0
3 years ago
18. which of these components is responsible for providing instructions and processing for a computer? a. cpu b. ssd c. ram d. r
cricket20 [7]

The components that is responsible for providing instructions and processing for a computer is a. CPU.

<h3>What area of the computer executes commands?</h3>

This command center's central processing unit (CPU) is a sophisticated, large-scale collection of electrical circuitry that carries out pre-stored program instructions. A central processing unit is a must for all computers, big and small.

Note that the CPU, RAM, and ROM chips are all located on the motherboard. The "brain" of the computer is known as the Central Processing Unit (CPU). It carries out instructions (from software) and directs other parts.

Learn more about CPU from

brainly.com/question/26991245
#SPJ1

7 0
1 year ago
Given the following classes and their objects:
Andrej [43]

Answer:

The answer is "Option b"

Explanation:

In the given code three-class C1, C2, and C3 are declared, in which C2  and C3 extend the class C1. In the next line, C2 and C3 object are created, that is c2 and c3. and in the last line c2 class object holds two-class C2, C1, and one object c3 value, this code will give runtime error because it can't cast object from sibling class, and wrong choices can be defined as follows:

  • In option a, It is not correct because it can't cast c3 object into c2 object.
  • In option c, It is not correct because it performs multiple casting in nested forms.
  • In option d, It is wrong because the statement is not correct.
3 0
3 years ago
Develetech has a security policy that mandates a basic security feature for mobile device access. What is this basic security fe
kirill [66]

Answer:A password or a PIN

Explanation: Develetech is a industry that has the a internet page and can also be used in the mobile devices. There is particular authorization that the organization provides to an individual user for accessing of the services to maintain the security .The security is maintained by providing the devices with an encrypted text that is known as the password. The user has to enter the pin or password to execute the service on device.

5 0
3 years ago
Other questions:
  • Florida convicted __________ people of DUI in a one-year period from 2009 to 2010.
    15·1 answer
  • Alex leads a team of eight members. Arrange his tasks in sequential order of phases of group dynamics. What are the stages in gr
    13·1 answer
  • What is an example of constructive criticism for an employee who is shy during meetings?
    15·2 answers
  • If you wanted to round $3.99 located in Cell B3 to the nearest dollar, what is the correct Microsoft excel formula?
    6·2 answers
  • Network is a process by which several protocols evolve to form a single product.
    13·1 answer
  • Which command displays the contents of the NVRAM?
    13·1 answer
  • What are entity-relationship diagrams and how are they used? What symbol is used for a relationship? What is an associative enti
    5·1 answer
  • PLZ ANSWER ALL MY QUESTION. Which line of code will display the variable num rounded to the nearest tenth?
    14·1 answer
  • Why would a programmer use a flow chart? (Edge2020 Coding Critical Thinking Questions)
    9·1 answer
  • Consider the following method, which is intended to return the index of the first negative integer in a given array of integers.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!