1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leokris [45]
3 years ago
15

Even though jdoe and jrock have the same password (i.e., hacker), their password hashes in the /etc/shadow file are different. W

hy is that?
Computers and Technology
1 answer:
Vitek1552 [10]3 years ago
5 0

Answer:

<h2>Hope this helps :</h2>

This is to prevent from anyone getting the password back from the hash.

have a nice day <3

Explanation:

You might be interested in
I need help..
labwork [276]

Answer:

which app are u using u should use Android studio or if u are using mac book use xcode

5 0
3 years ago
Which kind of a person will you be if you prove to be accountable for your actions?
Black_prince [1.1K]

Answer: You would be a person of integrity.

Explanation: Look up Integrity for details.

3 0
3 years ago
What should I do when the computer doesn't display Korean?(They are all □□)
bogdanovich [222]

Answer:

I Think You Could Go To Settings And Change It

Explanation:

I Think This Helps

5 0
3 years ago
File names should describe what is in the file in a few words
JulijaS [17]

Answer

File names should describe the content of the file.

Explanation

File names are set of words  which are used to uniquely identify computer files which are stored in a file system. This helps one to know the contents of the file which you want to find. When you name these file names you use necessary characters you use descriptive words so that you dont have hard times when searching for them. The naming also is determined by the file system you are using because different systems impose different restrictions on the length of the file names and the allowed characters within file names.

3 0
3 years ago
Is the weegy face real?or is it computer generated?
allsm [11]
Weegy face is known to be a computer generated program that was designed well by expert developers. It's a type of image that usually works whenever you use the Internet Explorer, and works most of the time on that browser.
3 0
3 years ago
Other questions:
  • What technology allows data to be stored in one place and be retrieved by many systems?
    7·1 answer
  • Which of the following correctly orders the investments from LOWER risk to HIGHER risk?
    7·2 answers
  • If a computer is found to have an ip address of 169.254.1.1, what can you assume about how it received that ip address?
    11·1 answer
  • Name three actions you can perform on an inserted image.
    7·2 answers
  • Creating a newsletter
    8·1 answer
  • Each of the outcomes listed below is a result of executing the following script except for one. Which one? CREATE ROLE ExampleRo
    6·1 answer
  • Select one or more of the following: Which of these events will cause signal(s) to be generated by the kernel (the operating sys
    6·1 answer
  • A computer byte is the amount of data (measured in bits) that CPU can manipulate at one time/
    8·1 answer
  • 1
    5·2 answers
  • Stock Market
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!