1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mademuasel [1]
3 years ago
11

1.which screen appears after the password is typed (welcome, lock)​

Computers and Technology
2 answers:
elixir [45]3 years ago
8 0

Answer:

welcomeyou don't know that much also

jenyasd209 [6]3 years ago
4 0

Answer:

it should be the welcome screen I will hope so lol

You might be interested in
The following program segment is designed to compute the product of two nonnegative integers X and Y by accumulating the sum of
mote1985 [20]

The program is correct: at the beginning, product = 0. Then, we start summing Y to that variable, and we sum Y exactly X times, because with each iteration we increase Count by 1, and check if Count=X so that we can exit the loop.

5 0
3 years ago
ILL GIVE BRAINLIEST You are taking a photograph of a valley and want to draw attention to a hamlet hidden amid the hills. Which
lana [24]
Answer: A
Explanation: Because it’s close to the hamlet but not blocking it like option B or drawing attention away from it like option C or D
Hope this helps!
7 0
3 years ago
Read 2 more answers
Who is the father of computer​
Irina-Kira [14]

Answer:

Charles babbage is the father of computer

5 0
3 years ago
What came after the Phonograph
Andre45 [30]

Answer:

Gramophone

Explanation:

3 0
3 years ago
Read 2 more answers
Hi there are many annoying people in brainly making my head ache
iris [78.8K]

Answer:

Lol who is bothering you?

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • On the Picture Tools Layout tab, you can preview results of the numerous styles, borders, effects, and layouts by _______ comman
    7·2 answers
  • 1. What are the biggest risks when using the public Internet as a Wide Area Network (WAN) or transport for remote access to your
    6·1 answer
  • 2.1. The stream cipher described in Definition 2.1.1 can easily be generalized to work in alphabets other than the binary one. F
    10·1 answer
  • RFID tags uses memory that is read-only.A. TrueB. False
    5·1 answer
  • A program that will read each player’s name and golf score as keyboard input,
    9·1 answer
  • That's my email address​
    14·1 answer
  • Explain the working system of computer systems with examples​
    14·1 answer
  • It is important to consider design details when creating an api because: ______________
    14·1 answer
  • assuming the default gateway is connected to the internet, what type of internet access would this server have?
    14·1 answer
  • By definition, what is the process of reducing security exposure and tightening security controls?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!