1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
prohojiy [21]
3 years ago
13

I don't know my password to brainly

Computers and Technology
2 answers:
garik1379 [7]3 years ago
7 0
Only thing I can think of making a new account I’ve had to make 3 accounts sadly
anygoal [31]3 years ago
6 0

Hiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii

maybe try seeing if you can guess your password? Sorry I know really bad advice.

You might be interested in
Horizontal lines should be avoided in photographs t/f
Temka [501]
I belived its true is the answer
3 0
3 years ago
the impact of the global digital divide. According to the authors, countries that lag behind the rest of the world’s ICT capabil
kvasek [131]

Answer:

hi

Explanation:

5 0
3 years ago
When somthing is trustworthy we call it what?
Gnom [1K]

Answer:

dependable

Explanation:

5 0
3 years ago
Read 2 more answers
What process identifies and grants access to a user who is trying to access a system? A. Credibility
xeze [42]

Answer:

Option C is the correct answer for the above question

Explanation:

Authentication is used to grant a person to use the system so that no other person can hack the data of the system. It is done by some unique id which is provided to the user of that system. When any person wants to use the system he needs to use that a unique id and sometimes password and some other information to use the system.

The above question asked about the process through which the user of the system grants access to use the system only. So the process is Authentication. hence Option C is correct because it states about the process Authentication while the other is not because--

  • Option a states Credibility which is not the process to enter the system.
  • Option b states Authorization which is used if the system gives access to the user, not the user can take on its own.
  • Option d states Honesty which is not the process to enter the system.
8 0
3 years ago
In a function name, what should you use between words instead of whitespaces?
Tom [10]
2. Identify the function of computer hardware components 
3 0
4 years ago
Other questions:
  • Where does the VLookup function find its lookup values?
    14·1 answer
  • To begin importing data from an excel spreadsheet, click on the ____ tab on the ribbon.
    11·1 answer
  • What time does walmart deposit paychecks?
    5·1 answer
  • Where is a 3D modeler most likely to work?
    6·1 answer
  • A(n) is the tool that will help you the most when developing the content you will use in your presentation.
    10·1 answer
  • Implement a sublinear running time complexity recursive function in Java public static long exponentiation (long x, int n) to ca
    11·1 answer
  • Hi, please help me complete my Database Development 2 hw by completing what should been done from the document and show the code
    11·1 answer
  • True or false: The objective of an Enterprise Resource Planning (ERP) system is to create a customized software program that int
    10·1 answer
  • Which is the least technically experienced technical support group?
    7·1 answer
  • What is the definition of overflow in binary?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!