1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
inessss [21]
3 years ago
14

How to reset windows 7 password without logging in

Computers and Technology
2 answers:
LUCKY_DIMON [66]3 years ago
6 0

Answer:

 1) Reboot your laptop or PC. ...

 2) Select the Repair your Computer option and press Enter. ...

 3) The System Recovery Options window will popup, click System Restore, it          will check the data in your Restore Partition and factory reset laptop                without password.

<h2><u>Hope This Helped!</u></h2>

hammer [34]3 years ago
4 0

Explanation:

<em>.</em><em>Reboot your laptop or PC. </em>

<em>Select the Repair your Computer option and press Enter. </em>

<em>The System Recovery Options window will popup, click System Restore, it will check the data in your Restore Partition and factory reset laptop without password.</em>

You might be interested in
Assume that the classes listed in the Java Quick Reference have been imported where appropriate.
Georgia [21]

rcre2nvijrnv

u1bcihdebc

nn

8 0
4 years ago
A network technician needs to set up two public facing web servers and watns to ensure that if they are compromised the intruder
Taya2010 [7]

Answer:

D. Place them in the demilitarized zone.

Explanation:

Demilitarized zone(DMZ) is a logical or physical sub network that contains and gives exposure to an organization's external-facing services to an not trust worthy network, basically a larger network like Internet. It's purpose is to add an extra layer of security in an organization's LAN(local area network).So we conclude that DMZ is best way so that intruder cannot access the intranet.

4 0
3 years ago
What application service allows you to decouple your infrastructure using messaged based queues?
vivado [14]

Answer:A) SQS

Explanation: Simple Queue Service (SQS) is Amazon based service that deals in queue that decouples the micro-services infrastructure or applications.It has the benefit of maintaining of the security, eliminating complexity, transmitting the data reliably etc.

It also provides the service of the storing the message, storing it and other functioning without the integrity in its security or any other resource need.Thus, option(a) is the correct option.

6 0
3 years ago
Say true or false::!
kherson [118]
True!
That was easy lol,
8 0
3 years ago
Read 2 more answers
Assume that an O(log2N) algorithm runs for 10 milliseconds when the input size (N) is 32. What input size makes the algorithm ru
NARA [144]

Answer:

An input size of N = 128 makes the algorithm run for 14 milliseconds

Explanation:

O(log2N)

This means that the running time for an algorithm of length N is given by:

F(N) = c\log_{2}{N}

In which C is a constant.

Runs for 10 milliseconds when the input size (N) is 32.

This means that F(32) = 10

So

F(N) = c\log_{2}{N}

10 = c\log_{2}{32}

Since 2^5 = 32, \log_{2}{32} = 5

Then

5c = 10

c = \frac{10}{5}

c = 2

Thus:

F(N) = 2\log_{2}{N}

What input size makes the algorithm run for 14 milliseconds

N for which F(N) = 14. So

F(N) = 2\log_{2}{N}

14 = 2\log_{2}{N}

\log_{2}{N} = 7

2^{\log_{2}{N}} = 2^7

N = 128

An input size of N = 128 makes the algorithm run for 14 milliseconds

5 0
3 years ago
Other questions:
  • Rikki has had several problems at work recently. Her printer isn't printing correctly, copies from the copy machine come out wit
    8·2 answers
  • Identify four basic data manipulations performed on a relational database using sql
    7·1 answer
  • Now, my Laptop has been working since I bought it yesterday it won’t start up and it when it does it overheats and shuts off, th
    10·2 answers
  • Modify the definition of the throttle class on page 35, to create a new throttle ADT, which allows the user of the ADT to specif
    6·1 answer
  • A user left a comment. Which best describes where will it be seen?
    12·2 answers
  • What is the name of a process thorough which several biometric readings are taken on an individual in order to create an accurat
    11·1 answer
  • A source is:
    15·2 answers
  • Every telecommunication setup uses two devices: one device to transmit data and one device to receive data. Which device transmi
    15·1 answer
  • 3.4 code practice question 2 edhesive
    6·2 answers
  • You recently created a new network segment for the development department. Because the hosts are now on a different network segm
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!