1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dsp73
3 years ago
5

Wdlwmddwwddwwdwdwdwwddwdw

Computers and Technology
2 answers:
iren2701 [21]3 years ago
7 0

Answer:

wdlwmddwwddwwdwdwdwwddwdw

Ivahew [28]3 years ago
5 0
Answer: hjhihjhjgjgjgjgjgjgjgjgjgjjgj
You might be interested in
You should reach across something to lift a load is this true or false
Grace [21]

Answer:

False. Never reach across a load when you're trying to lift it.

3 0
3 years ago
my headphone jack that is like in the computer will not work only my speakers will work when i plug in
marusya05 [52]

I'm assuming that what you are saying is that while the headphone is plugged in to the computer, it still plays on the computer speakers.

Most likely, the headphone outlet is dirty and need cleaning. To solve this, plug in your headphones into the headphone outlet, and take it out really quickly. Do this for a certain amount of time until it works.

If this does not work, check the settings if you are allowing it to play into external devices or not.

~

3 0
3 years ago
Read 2 more answers
How many values will the user submit each time this form is used? Color: RedBlueGreen Quantity:
e-lub [12.9K]

Answer:

2

Explanation:

User submit quantity 2. with Color : Red Blue Green

7 0
3 years ago
Which of these is a poetic device walt whitman often uses to emphasize certain ideas in his poems?a. meterb. alliterationc. rhet
Ivanshal [37]
Alliteration (apex) i just guessed on it and got it right
5 0
3 years ago
Remote authentication has always been a concern because the person is coming from a public network, and many companies require t
g100num [7]

Answer:

Incomplete Question.

I'll answer this question based on general terms

Explanation:

Two Factor Authentication, abbreviated as 2FA.

It is a type of authentication that requires the presentation of two credentials for access to personal data and information.

The credentials needed for a 2FA are

1. Either of the following; PIN, Password or Pattern

2. Your device or gadget which could be an ATM Card, Mobile Phone

3. Biometrics such as fingerprint, voice input

Number one is often referred to as "Something you know"

Number two is referred to as "Something you have"

Number three is referred to as "Something you are"

The 2FA doesn't require the three aforementioned credentials. It only needs just two of the credentials to provide its authentication.

8 0
4 years ago
Read 2 more answers
Other questions:
  • An example of a historical challenge of STAMIS is
    13·2 answers
  • "Common knowledge" must always be credited or else it is considered plagiarism?<br> True<br> Fales
    5·1 answer
  • If you were infiltrating a network (10.16.0.0/16), and searching for vulnerabilities (while trying to remain undetected), why wo
    11·2 answers
  • Why does dew form on grass overnight
    7·1 answer
  • Using encryption, a sender can encrypt a message by translating it to which of the following?
    15·1 answer
  • 1. Why is it important for IT technicians to keep documentation on computers for which they are
    13·1 answer
  • Who wants brainliest? First to answer gets it....
    12·2 answers
  • Write a program that will input temperatures for consecutive days. The program will store these values into an array and call a
    9·1 answer
  • The ________ marker is the character that marks the end of a file and is automatically written when the file is closed.
    6·1 answer
  • 9.2.8 last names codehs
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!