1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vanyuwa [196]
3 years ago
10

I.d 9934607467 p.a.s.s 54321 P.L.E.A.S.E J.O.I.N. Z.O.0.M. M.E.E.T.I.N.G

Computers and Technology
1 answer:
dusya [7]3 years ago
7 0

Answer:

You could just go to social medIa to say j.o.i.n z.o.o.m not brainly mate

You might be interested in
You plan to use the Fill Down feature on a formula in Excel and need to keep a cell reference the same. Which format allows you
Drupady [299]
The answer would be B. $E$19 would keep the cell and row the same.
5 0
3 years ago
When authenticating a user's password, the password supplied by the user is authenticated by comparing the ____ of the password
Bas_tet [7]

Answer:

Hash.

Explanation:

An authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification. Smart cards, digital certificates, picture passwords, and biometrics are generally used to perform an authentication in the field of computer.

Hence, when authenticating a user's password, the password supplied by the user is authenticated by comparing the hash of the password with the one stored on the system.

In Computer science, a hash function can be defined as any function which is used to map data by accepting a block of data with variable length size or arbitrary size as input to produce a fixed size hash values or codes.

Generally, when a block of data (input) of arbitrary size is hashed, the resulting hash values or codes is usually smaller than the input data. Thus, hash functions are considered to be a compression of data and as a result, sometimes called compression functions. Basically, the block size of a hash function typically ranges from 128 bits to 512 bits.

5 0
2 years ago
What is your perception of what a safe classroom looks like
Andreyy89

Answer:

6 feet apart

Explanation:

6 0
3 years ago
30 POINTS Conduct Interviews
Kitty [74]

Answer:

still need help with this if so lmk so o can help ya asap:)9

5 0
3 years ago
You are most likely to automatically encode information about
Orlov [11]

Answer:

You are most likely to automatically encode information about the sequence of your day's events.

5 0
2 years ago
Other questions:
  • Olivia needs to get permission to use a graph of data gathered by a trade association she plans to include the graph in a report
    10·2 answers
  • Given the following code, what is output by the method call, mystery(6 * 8)?
    8·1 answer
  • HEY DO U LIKE TRAINS!
    7·1 answer
  • If you're sending an email from your laptop to a classmate the laptop is the
    11·1 answer
  • Header and Footer options are located in the _____ tab.
    7·1 answer
  • Which of the following is NOT a good idea to do after you change the root password?
    12·1 answer
  • 1. cybersquatting refers to the tampering of existing web sites and selling unrelated products (true or false)
    8·1 answer
  • Please help it would mean to world to me❤️ (WORD)
    13·1 answer
  • I recorded a video on my windows PC, but when i tried to play it i got this message:
    6·2 answers
  • Computer always produces wrong output true or false<br>​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!