1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pavel [41]
2 years ago
6

Why does my school crhomebook not letting me sign In

Computers and Technology
2 answers:
serg [7]2 years ago
8 0
Wrong sign in or no internet
Stella [2.4K]2 years ago
3 0
Wrong sign in information that your putting in maybe?? If it’s not even giving you an option you need to ask your teachers next time your in school
You might be interested in
1. Data in a smart card can be erased
Ostrovityanka [42]

Answer:

false

true

false

true

true

5 0
3 years ago
Read 2 more answers
Write a function named replaceSubstring. The function should accept three C-string arguments, let's call them string1, string2,
hoa [83]

Answer:

All is in explanation.

Explanation:

#include <iostream>

#include <cstring>

#include <string>

using namespace std;

//function prototype

string replaceSubstring(const char *, const char *, const char*);

string replaceSubstring(string, string, string);

int main()

{

//declare three char array to hold strings of max 100 chars

char string1[101];

char string2[101];

char string3[101];

//prompt user to enter input

//then read

cout << "Enter string to search:\n";

cin.getline(string1, 101);

cout << "Enter the string you want to replace:\n";

cin.getline(string2, 101);

cout << "What do you want to replace it with?\n";

cin.getline(string3, 101);

cout << "Your updated string is:\n";

cout << replaceSubstring(string1, string2, string3);

//return 0 to mark successful termination

return 0;

}

string replaceSubstring(const char *st1, const char *st2, const char *st3){

//declare pointers start and occurrence

//initialize start with string to search

//char *startSearch = st1;

//initialize occurrence with the first occurrence

//of st2 in st1

char *occurrence = strstr(st1, st2);

//declare empty string

string output = "";

//using occurrence as control for while loop

//means that it will iterate until no more

//occurrences are found

while(occurrence){

//append to final string the characters of st1

//up until first occurrence of st2

output.append(st1, (occurrence-st1));

//append st3 to final string

output.append(st3, strlen(st3));

//update occurrence to point to character

//of st1 just after first occurrence of st2

st1 = st1 + (occurrence-st1) + strlen(st2);

//find new occurrence

occurrence = strstr(st1, st2);

}

//st1 now points to first character after

//last occurrence of st2

output.append(st1, strlen(st1));

return output;

}

string replaceSubstring(string st1, string st2, string st3){

//convert input strings to C-strings

const char *ptr1 = st1.c_str();

const char *ptr2 = st2.c_str();

const char *ptr3 = st3.c_str();

//call function that accepts C-strings

replaceSubstring(ptr1, ptr2, ptr3);

}

6 0
2 years ago
Read 2 more answers
Which of the following is not a group of energy sources?
Dimas [21]

Answer:

nonrenewable

Explanation:

Brainliest please

4 0
3 years ago
Read 2 more answers
You have configured your firewall to authenticate a group of 100 users who are in your company. You set up the database of users
svetlana [45]

Answer:

Explanation:

Network Access Control is needed to make sure that only set of verified users access the network.

It makes sure that the users are authenticated and only set of some verified users have access to network.

Set of NAC solutions like Impulse SafeConnect, Extreme Networks, ExtremeControl, Auconet BICS, ForeScout CounterACT, Pulse Policy Secure could be installed in the system which along with basic profiling will make sure authenticated access to the network.

Other than this basic encryption-decryption algorithm can be used in this regard. Network components could use encryption algorithms like RSA and DES. These algorithms will make sure that the information from database side is well encrypted. Once that information goes to the network component. They can decrypt the encryption by generating relevant key using the same algorithm.

This will only allow authentic users to access information and also it will stop the leakage of information in between the transmission because of encryption.

4 0
3 years ago
What is an idea for novel food production technologies or systems that require minimal resources and produce minimal waste, whil
Luden [163]

Answer:

Dehydrated food that is vacuumed sealed.

Explanation:

Dehydrated food is not hard to make and holds the nutritious values needed for a human to survive. Dehydrated food can last up to 1-2 years if vacuumed sealed.

7 0
2 years ago
Read 2 more answers
Other questions:
  • A Color class has a method getColorName that returns a string corresponding to the common name for the color, e.g., yellow, blue
    11·1 answer
  • In poor weather , you should ___ your following distance.
    12·1 answer
  • How is a computer component, such as a network card, commonly marked for identification?
    12·1 answer
  • Ann has always wanted to be the person on the news broadcast who delivers the weather updates. She’s looking into becoming a bro
    6·2 answers
  • How can you tell that you're driving in the right direction?
    14·1 answer
  • One way to prepare for filing the PROFILE is to:
    12·2 answers
  • When was the federal commission act put into effect?????
    13·1 answer
  • Which is an example of a Boolean operator that evaluates as TRUE?
    14·1 answer
  • Each sentence in the paragraph below has a number. Choose the number of two sentences that are in the wrong order in this story.
    14·1 answer
  • What is microsoft excel​
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!