1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leokris [45]
3 years ago
15

Even though jdoe and jrock have the same password (i.e., hacker), their password hashes in the /etc/shadow file are different. W

hy is that?
Computers and Technology
1 answer:
Vitek1552 [10]3 years ago
5 0

Answer:

<h2>Hope this helps :</h2>

This is to prevent from anyone getting the password back from the hash.

have a nice day <3

Explanation:

You might be interested in
I need help 50 points and brainless if you answer
nata0808 [166]

Answer:

50

var X gets passed into the rectangle function, which I assume would set the x and y coordinates to what the var's have already been set to.

4 0
3 years ago
Read 2 more answers
Why is it helpful that the ribbon tabs can collapse?
Verizon [17]
<span>The 'Pin the ribbon' button replaces the 'Collapse the Ribbon' button when the ribbon is collapsed. You will see the 'Pin the ribbon' button only when you expand a ribbon by tapping or clicking a tab.</span>
4 0
3 years ago
After an entry in the medical record has been written or keyed and an error is discovered, what procedure should be followed to
Readme [11.4K]

Answer:

(C) Draw a line through the error; then call the patient’s physician.

Explanation:

According to my research on medical procedures, I can say that based on the information provided within the question the best procedure that should be taken in this situation would be to draw a line through the error; then call the patient’s physician. By doing so you get rid of the the error and by telling the patient's physician you get rid of any possibility of the physician still thinking that the error was something that was already done.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

5 0
3 years ago
A run is a sequence of adjacent repeated values. Write a
Roman55 [17]

Answer: yeet

Explanation:

liker up

6 0
3 years ago
What is the value of ans after the following code has been executed? int x = 35; int y = 20, ans = 80; if (x &lt; y); ans = y; g
Sauron [17]

100

After the following code has been executed, the value of ans is 100:

int x = 35;

int y = 20;

ans = 80;

if (x < y) {

 ans += y;

}

This is because the value of ans is incremented by y when the code is executed.

Learn more here:

brainly.com/question/27093439

#SPJ4

8 0
2 years ago
Other questions:
  • What does the int size = sizeof buffer / sizeof * buffer means ?
    7·1 answer
  • Create an array of numbers filled by the random number generator. (value = (int)(Math.random() * 100 + 1);) Print the array and
    9·1 answer
  • What is the diffrence between the the grassland and the savanna biomes
    11·2 answers
  • What is the code name for the 12 engineers who developed the ibm pc?
    8·1 answer
  • If the algorithm does not have instructions for unanticipated results, the computer program will a. solve a problem b. start ove
    6·1 answer
  • The three Fs of product design are form, fit and
    7·2 answers
  • it says i have brainly plus subscripton but whenever i log onto brainly using my laptop, it says i don't have brainly plus and w
    12·1 answer
  • Please help me ASAP! Here is the question.
    15·1 answer
  • John typed 545 words in 35 minutes, what is his typing speed
    8·2 answers
  • Universal Containers wants to use a sandbox with real data in it. Which Sandboxes three would you recommend?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!