1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jolli1 [7]
2 years ago
5

Help me pleaseeee!

Computers and Technology
2 answers:
vampirchik [111]2 years ago
8 0

Answer: Go to the router and look at the bottom and it says the password

Explanation:

I know this because i do it all the time.

kenny6666 [7]2 years ago
5 0

Answer:

Try checking around on the router!

Explanation:

Assuming they haven't changed it, most routers have their default password displayed somewhere on it. I hope this helps!! ^^

You might be interested in
Which device should be used for enabling a host to communicate with another host on a different network?
Lady bird [3.3K]
A router <span>should be used for enabling a host to communicate with another host on a different network.</span>
7 0
3 years ago
In UML behavioral modeling, a message is _____. (Points : 6) a named location in memory where information is deposited and retri
rusak2 [61]

Answer: a function or procedure call from one object to another object

Explanation: UML(Unified Modeling language) behavioral modeling is the depiction of the relation of the elements in a dynamic manner and the dependency on time .Message in the UML behavioral modeling is a functional call taking place from one element to another.

The interaction is the model is seen through the flow of messages.Other options are incorrect because message is not information holding data structure, does not display the relation between object rather presents the flow and is not a memory location .

7 0
3 years ago
A museum is evaluating historical documents for authenticity, reviewing their physical condition, and categorizing them by subje
statuscvo [17]

Defining and assigning categories by the subject could be automated easily without incurring high costs or large amounts of time and effort.

One may create a straightforward algorithm to categorise the documents.Include every potential category in the algorithm.

Then, it would be simple to organise documents by subject, immediately backing up to a public cloud. Keeping corporate workloads on the public cloud involves duplicating resources.

As a fallback, using a service provider. selecting a backup solution that works between clouds (C2C). using online cloud backup services.

You should assess or evaluate these information sources once you have located information that satisfies the topic and criteria of your research. When you evaluate information, you are prompted to consider the authority, timeliness, point of view, and bias of various information sources.

Learn more about time and effort:

brainly.com/question/27670681

#SPJ4

6 0
2 years ago
An example of cooler red is
BARSIC [14]

apple, stop sign, fire truck, stop light... ect

6 0
3 years ago
How can an antivirus protect your device​
Igoryamba
Antivirus software protects your device from viruses that can destroy your data, slow down or crash your device, or allow spammers to send email through your account. Antivirus protection scans your files and your incoming email for viruses, and then deletes anything malicious
3 0
2 years ago
Read 2 more answers
Other questions:
  • A(n) _______________ supplies one of the most critical aspects of docking stations, but in a smaller, more portable format: supp
    15·1 answer
  • Which of the following is the first step in a lockout-and-tag procedure? A. Place your lock on the breaker or switch. B. Sign yo
    12·2 answers
  • Can somebody tell me when is ps5 releasing???​
    15·2 answers
  • A series of four or five comparisons and calculations that together determine an employee's withholding tax value might be group
    6·1 answer
  • Compare and contrast an example of an actual company that has a brick and mortar location with an actual company that does not h
    8·1 answer
  • Write a method named printGPA that takes in as a parameter a Scanner to read in user input, and calculates a student's grade poi
    8·1 answer
  • Write a method that evaluates to true or false depending on whether a box completely fits inside another:
    12·1 answer
  • In a well-developed paragraph - using domain-specific vocabulary and academic writing - address the following writing prompt:
    12·1 answer
  • In your opinion., which Zelda character is the hottest? Be honest.
    7·1 answer
  • A hacker is trying to gain remote access to a company computer by trying brute force password attacks using a few common passwor
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!