1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leokris [45]
3 years ago
15

Even though jdoe and jrock have the same password (i.e., hacker), their password hashes in the /etc/shadow file are different. W

hy is that?
Computers and Technology
1 answer:
Vitek1552 [10]3 years ago
5 0

Answer:

<h2>Hope this helps :</h2>

This is to prevent from anyone getting the password back from the hash.

have a nice day <3

Explanation:

You might be interested in
Pls say correct guyz pls pls pls
ohaa [14]

correct

Explanation:

I like your choice of words. you seem like a high level writer. keep up the good work!

7 0
3 years ago
Green computing can be achieved by: a. using video conferencing, electronic meeting systems, and groupware. b. replacing meeting
Rama09 [41]

Answer: using video conferencing, electronic meeting systems, and groupware

Explanation:

Green computing simply means the use of computer in a way that's environmental friendly.

One way to achieve this is through using video conferencing, electronic meeting systems, and groupware. This allows the use of computers not to have a negative effect on the environment.

4 0
3 years ago
The fill command try’s to fill or generate content for cells based on a ________.
natta225 [31]

Answer: Ctrl + R

Explanation:

Ctrl+ R is the shortcut for filling right, you will first highlight cells.

5 0
3 years ago
If a packet gets "sucked down a black hole" (figuratively speaking) and is not received by its sender, and no message is sent ba
Serga [27]

Answer:

iso

Explanation:

3 0
2 years ago
Which of the following comments are correct? Select all that apply.
AnnZ [28]

Answer:

1/ hello

Explanation:

7 0
3 years ago
Other questions:
  • Explain briefly why people often have a pretty good understanding of computer hardware.
    14·1 answer
  • Which tab allows you to modify the width of a page margins in Microsoft word?
    7·2 answers
  • The arguments in a method call are often referred to as ____ . The variables in the method declaration that accept the values fr
    10·1 answer
  • In this lab, you will use all of the graphics commands you have learned to create an animated scene. Your program should have a
    10·1 answer
  • Hi need help on this <br> what is cyberspace
    14·1 answer
  • You just settled in for some study time at the local coffee shop, and you pause long enough to connect your smartphone to the Wi
    7·1 answer
  • Through the use of computational thinking techniques, models and algorithms can be created. A(n) ___1___ can be created that rep
    12·2 answers
  • You are working for a company that is responsible for determining the winner of a prestigious international event, Men’s Synchro
    5·1 answer
  • How can a cell phone tower help people​
    11·2 answers
  • What is an insertion point?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!