1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Stells [14]
3 years ago
15

Whats the difference between Input and Output? Give and example of an example on a M:B​

Computers and Technology
1 answer:
Akimi4 [234]3 years ago
3 0

Answer:

Entrar en algún lugar no es como irse de algún lugar, o qué tipo de pregunta significa para mi acción

You might be interested in
TWO QUICK QUESTIONS
andrezito [222]
I'm guessing 8? But I'm not 100% positive 
5 0
3 years ago
Which password attack method uses long lists of words that have been predefined and can be quickly downloaded for use to break a
vova2212 [387]

Answer:

A dictonary attack.

Explanation:

Dictionaries hold many words that can be downloaded and used. Word or name passwords are usually just one word or maybe two. In other words, predefined words being used as a password? Not safe. When someone attempts to crack it, they use brute force attacks. Among these are dictionary attacks, which focus on the actual words rather than numbers.

3 0
2 years ago
How do I do a PowerPoint
kirill115 [55]
It is like this: . You just put a circle and that is a power point
4 0
3 years ago
Read 2 more answers
What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?.
Juli2301 [7.4K]

Answer:

(config)# enable password secret

(config)# enable secret Encrypted_Password

(config-line)# password secret

(config)# enable secret Secret_Password

(config)# service password-encryption

Explanation:

To prevent all configured passwords from appearing in plain text in configuration files, an administrator can execute the service password-encryption command. This command encrypts all configured passwords in the configuration file. For more: https://ccnav7.net/what-command-will-prevent-all-unencrypted-passwords-from-displaying-in-plain-text-in-a-configuration-file-2/

3 0
2 years ago
What do you mean by algorithm​
Snowcat [4.5K]

A process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.

7 0
3 years ago
Read 2 more answers
Other questions:
  • 1. If this traffic signal is turned on after the red light, it means you may cross the intersection, but you _______ wait until
    12·2 answers
  • You have been asked to report on the feasibility of installing an IP CCTV camera system at your organization. Detail the pros an
    5·1 answer
  • Samira works for a large U.S. company that has factories all over the world. Samira returned to the U.S. after visiting several
    9·1 answer
  • You can get context-sensitive help information from the Code Editor by_________.A) selecting Contents from the Help menu
    9·1 answer
  • The first known permanent photograph was called "View from the Window at Le Gras." True False
    9·1 answer
  • An invisible path determining the way of travel from one place to another.
    10·1 answer
  • How many megapixels is in a macbook air 2017 camera
    10·1 answer
  • Impaired drivers are one of the many risks drivers face on the Highway Transportation System. List 3 signs that a driver could b
    10·2 answers
  • PLZ HELP ASAP
    13·1 answer
  • how does a demilitarized zone (dmz) work. A.By preventing a private network from sending malicious traffic to external networks
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!