1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BARSIC [14]
3 years ago
13

What registry file contains installed programs' settings and associated usernames and passwords?​?

Computers and Technology
1 answer:
DerKrebs [107]3 years ago
7 0
Software.dat is the <span>registry file contains installed programs' settings and associated usernames and passwords.
</span>The extension .dat denotes a generic data<span> file that stores information specific to the application it refers to.</span>
You might be interested in
If your network consists of all connected devices connecting to one central device, such as a switch, what type of topology is b
3241004551 [841]

Answer:

The correct answer to the given question is " Star Topology ".

Explanation

In the star topology, all the devices are connected to one central device in the network. It means every individual device is connected individually with the central device in the network.

The main drawback of star topology is that if the central device fails then all the device which are connected with them is also failed. The second drawback of star topology is to connect with the central device it requires more cabling.

8 0
3 years ago
Laws differ from theories because laws do not provide
AveGali [126]
Laws differ from theories because laws do not provide an explanation for how things work or could possibly work. A law describes what happens or needs to happen under certain conditions. A law can predict what will happen as long as those conditions are met. <span>For the purposes of this discussion, a "law" is a rule that has been formalised by repeated testing. It is also a generalisation. A theory, on the other hand, is an explanation for an observation that is supported by a large body of evidence. </span>
7 0
3 years ago
What are the 6 external parts of a computer
Sedbober [7]

External computer components connect to the motherboard through a series of ports on the computer case. Many components have their own dedicated port connections, such as those to connect audio equipment or the computer monitor. Others may share a single type of connector, such as the USB, that connects everything from keyboards and mice to game pads and external hard drives. there


8 0
3 years ago
Which are characteristics of pseudocode? Select all that apply.
jeka94

Answer:

A,B,C

Explanation:

3 0
3 years ago
All websites with medical information should be considered credible.
larisa [96]
No, this is not true. WebMD is a great example asking you of simple symptoms that you may be facing and your results could present an apparent fatal disease. This constantly scares the population of netizens whenever they would want a quick diagnosis online through these medical information sites. The best solution to your symptoms is to visit your family doctor or a licensed physician who will give you proper diagnosis checking your vital signs and other related information. Do not always trust the internet and the information it gives you as a user you must take the information with discretion before reacting inappropriately. 
3 0
3 years ago
Read 2 more answers
Other questions:
  • A complete traversal of an n node binary tree is a(n)____ "operation if visiting a node is O(1)for the iterative implementation
    5·1 answer
  • Infrared, a wireless connection used in the past prior to bluetooth, was limited because it ________.
    10·1 answer
  • Which describes which CTSO each student should join?]
    7·1 answer
  • Shelly tells a friend that her computer needs to be fixed because it has been producing a lot of heat and is smoking. Where is t
    10·1 answer
  • High level language - An object oriented programming language​
    5·1 answer
  • Which function would you use to make sure all names are prepared for a mailing label? TODAY UPPER PROPER LOWER
    11·1 answer
  • In the context of computer and network security, a security system is said to possess _____ when it does not allow data to be co
    13·1 answer
  • 2. How much did John Jones have in his account on the first day of the
    5·1 answer
  • Add me on Fortn!te <br> TsarBacon (imma girl)
    11·1 answer
  • Is e commerce a challenge or opportunity to the freight forwarder
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!