1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
grin007 [14]
2 years ago
5

How to connect on phpmyadmin?plss

Computers and Technology
1 answer:
Alex2 years ago
5 0

Open your browser and go to localhost/PHPMyAdmin or click “Admin” in XAMPP UI. Now click Edit privileges and go to Change Admin password, type your password there and save it. Remember this password as it will be used to connect to your Database.

hope this helps!

You might be interested in
Plane eyes I don't know
FrozenT [24]
IFLY is probably what it was.
3 0
3 years ago
Which of the following describes the purpose of project management? planning and organizing resources to meet a goal arranging t
True [87]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The question is about selecting the option among given options that best describes the purpose of project management.

The correct option of this question is the purpose of project management is planning and organizing resources to meet a goal.

Because project management is all about planning and organizing resources of a project to meet project goals.

Other options are not correct,

because arranging the order of tasks in a project, presenting data in an organized manner, and producing a quality project- all come under project management- are parts of planning and organizing steps of project management.

4 0
2 years ago
To calculate the multiple of 5
Anastasy [175]

Answer:

more information

Explanation:

lllll

5 0
3 years ago
In the context of intentional computer and network threats a ____ is a programming routine built into a system by its designer
lara31 [8.8K]

Answer:

a. backdoor

backdoor (also called a trapdoor) is a programming routine built into a system by its designer or programmer. It enables the designer or programmer to bypass system security and sneak back into the system later to access programs or files.

6 0
3 years ago
Read 2 more answers
Why is it important to have user accounts? describe the purpose, features and functions of user accounts (including administrato
TEA [102]
Its important to have user accounts so you can save data and maybe log in and out of a device/cmp to another one. The purpose of the user account is to help save your stuff and personalize your device. The features are more data storage to add up, and ability to make more accounts for others so each of you can personally have their own account and save their own data on their own. Administrator accounts are the highest and have the most power of all, they are in charge of everything, especially giving permission to apps you may have downloaded and removing system apps. Users rights are the tasks specific users can do to make sure no user has too much power or less so to speak and it means what you are able/not able to do as well.
5 0
3 years ago
Other questions:
  • Easy question how the internet has impacted y’all life
    13·1 answer
  • You have been contracted by a local school to evaluate their computer labs for security threats. They are most worried about the
    6·1 answer
  • Ben pays his mobile bills, watches movies, and shops online using the Internet. Which internet activity does he perform?
    13·2 answers
  • Claire writes a letter to her grandmother, in which she describes an amusement park she visited last week. She adds pictures of
    13·1 answer
  • Question 1 (1 point)
    5·2 answers
  • What are the functions of super computer?<br> ​
    7·2 answers
  • Which of the following is an example of group dynamics?
    8·1 answer
  • To what extent do you agree with the assertion that “Collection development begins with community analysis”. (Give reasons to bu
    7·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    12·1 answer
  • What would be an ideal scenario for using edge computing solutions?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!