1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jolli1 [7]
2 years ago
5

Help me pleaseeee!

Computers and Technology
2 answers:
vampirchik [111]2 years ago
8 0

Answer: Go to the router and look at the bottom and it says the password

Explanation:

I know this because i do it all the time.

kenny6666 [7]2 years ago
5 0

Answer:

Try checking around on the router!

Explanation:

Assuming they haven't changed it, most routers have their default password displayed somewhere on it. I hope this helps!! ^^

You might be interested in
In multi-grade oil what is W means?
Simora [160]

Answer:

winter viscosity grades

Explanation:

6 0
3 years ago
Write a program that creates an ArrayList and adds a Loan object, a Date object, a string, and a Circle object to the list, and
12345 [234]

Answer:

//importing package java.util.ArrayList to use ArrayList in the program

import java.util.ArrayList;

import java.util.Date;

public class test_array_list {

// Main method

public static void main(String[] args) {

 // Create an array list of objects

 ArrayList<Object> s = new ArrayList<Object>();

 s.add(new Loan());  

 s.add(new Date());  

 s.add(new String("String class"));

 s.add(new Circle());

 // Display all the elements in the list by

 // invoking the object’s to String() method

 for (int element = 0; element < o.size(); element++) {

  System.out.println((s.get(element)).toString());

 }

}

}

Explanation:

The Above code has proper comments to which is self explanatory.

6 0
4 years ago
You need to include the _____ directive in your program in order to use the time function.
PtichkaEL [24]
From Google:

"<span>a built-in C++ function that returns the current time(according to your computer system's clock) as seconds elapsed since midnight on January 1, 1970; often used as the seed argument in the srand function; a program that uses the time function must contain the #include <ctime> directive"

I hope this helps you with your question</span>
4 0
3 years ago
Hey, how do we get our warnings removed?
Effectus [21]

Answer:

post good answers

Explanation:

6 0
2 years ago
Read 2 more answers
A digital computer has a memory unit with 26 bits per word. The instruction set consists of756 different operations. All instruc
prisoha [69]

Answer:

hello your question is incomplete attached below is missing part of the  question

Determine how many bits are needed for the opcode

answer : 7 bits

Explanation:

Given data:

memory unit = 26 bits per word

Instruction set consists = 756 different operations

Determine how many bits are needed for the opcode

First we determine The number of bits required to represent 756 operations

= Log^{756} _{2} = 9.56 ≈  10 bits

finally the number of bits needed for the opcode can be determined by

2^9 = 512 ,   and 2^{10}  = 1024

since 2^10 > 756 hence the number of bits will be 10 bits

4 0
3 years ago
Other questions:
  • How to make a sad face on keyboard using alt?
    5·2 answers
  • Gn to be printed at a commercial printer. Which main ink type's exact color appearance is determined by the printer and requires
    13·1 answer
  • Letm1, m2,···mnbe distinct numbers on the number line, in the increasing order. Your goalis to color all of them blue. You have
    9·1 answer
  • A URL suffix is called a domain name.
    11·1 answer
  • Briefly describe the interface between the memory and the processing unit. That is, describe the method by which the memory and
    6·1 answer
  • Which of the following actions would not reduce software piracy? reducing the cost of software. offering downloads of software.
    12·2 answers
  • It is impossible to overemphasize the fact that, from the perspective of a computer, a network is a) simply another I/O device.
    9·1 answer
  • Guidelines on how to write a report on how technology has affected office duties
    15·1 answer
  • Deleting messages keeps them in the mailbox and on the server. How can they be removed from the server to reduce the quota?
    5·2 answers
  • Which type of vulnerability scan mimics the work of a threat actor who has already exploited a vulnerability and compromised cre
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!