outline the steps involved in signing into your account​

Answers

Answer 1
You put in your username or email and then you put in your password! It’s as simple as that :D

Related Questions

This is an image of the ...........................Topology.

if answer Correct i will mark the first person brainly.​

Answers

Answer:

Mesh

Explanation:

what information about a cisco router can be verified using the show version command?

Answers

- the routing protocol version that is enabled.
- the value of the configuration register.
- the operational status of serial interfaces.
- the administrative distance used to reach networks.

The software which manages environment for running programs handling error controlling devices configuring the computer system and managing the resources of a computer.
Write the technical term of the given question of the picture .
Correct Answer =⟩ Thanks
Best answer =⟩ Brainliest
Random answer =⟩ Reported and deleted ​

Answers

Answer:

D

Application

System software is the set of programs that enables your computers hardware devices and Application software to work together.

Practical computer systems divide software systems into two major classes: System software: Helps run the computer hardware and computer system itself. System software includes operating systems, device drivers, diagnostic tools and more. ... (Some application software is pre-installed on most computer systems.)

Explanation:

You are creating a program that can add up the amount of money the user spent that day. Right down to the penny! What kind of variables should you create? a default variable a user variable an integer variable a float variable

Answers

Answer:A. A default Variable

Explanation:

Answer:

A

Explanation:

Did it on a Test

3.) The primary storage device that holds the data currently being processed by the computer is​

Answers

Computer memory I hope it works

Answer:

I personally think its a hard drive or something like that,im not a computer expert to be honest

Write a 20 charecter poem! for points! :)

Answers

you are wonderful as you are blue you are as blue as the sky the sky is beautiful as u are too you are red as Rose's and Rose's are full of you winter time is the mood full of winter and snow

What do software engineers use as tools to provide automated support for the development of the system

Answers

Answer: CASE

Explanation:

Your grandmother tells you a dollar doesn't go as far as it used to. She says the "purchasing power" of a dollar is much less than it used to be. Explain what she means. Try to use and explain terms like inflation and deflation in your answer. ​

Answers

Answer:

The obtaining influence of a dollar is substantially less on the grounds that more cash is made and causes the value of the dollar greenback to diminish, making things increasingly costly. This is called swelling. In any case, when less cash is made, the value of a dollar greenback increments and things turn out to be more affordable. This is called flattening. As the years go on, the purchasing power of a dollar decreases and decreases.

Hope that helps. x

Question 11
Methods that return a decimal value must be declared using what type?


a. int

b. void

c. double

d. String

e. null


Question 12

Which of the following is true when x = 15?


a. (x >= 15) && (x < 13)

b. !(x > 13) || (x > 16)

c. (x > 13) && (x < 17)

d. (x < 15) || (x > 15)

e. (x <= 13) || (x >= 17)

Answers

Answer:

11. a, 12.c

Explanation:

bc numbers must be declared as ints and 15 is greater than 13 but lesser than 17

NO links!!! please, In this task, you will prepare the necessary documents required to apply for the job. Conduct research and find out what documents are necessary, such as a résumé, cover letter, and so on. Then, prepare these documents using your information and tailor the documents to the career you have chosen.
the job I chose was a software architect
It's from PLATO

Answers

To apply for a job, you must provide a resume, cover letter, reference list, letters of recommendation, portfolio, and employment certificate.

About these documents we can inform you that:

The Resume presents the most generalized information about the candidate's educational and professional background.The cover letter must be made to show more in-depth information, where the candidate reinforces their most positive points and relevant to the job vacancy.The reference list presents the opinion of other professionals about your professional abilities.The portfolio must be submitted by candidates related to artistic or visual areas and presents the works already created by that professional.The employment certificate must show your professional history in more detail.

Thus, we can state that the application for a job vacancy requires that many documents and information be provided.

More information on writing a resume at the link:

https://brainly.com/question/862477

A(n) ________ address is the address that external entities use when communicating with your network.

Answers

Answer:

IP adress

Explanation:

the IP adress is like your home address but for your computer. it tells the whatever is connecting where it's located so it can find where to send the data

Brake fluid is made up of a chemical that:​

Answers

hi there!

Brake fluid is a type of hydraulic fluid used in hydraulic brake and hydraulic clutch applications in automobiles, motorcycles, light trucks, and some bicycles. It is used to transfer force into pressure, and to amplify braking force. It works because liquids are not appreciably compressible.

hope this helps.

To gain access to the functions and variables of a library module, use a(n) _________ statement. A. import B. export C. global D. library

Answers

Answer: import

Explanation:

Can someone please help

Answers

Answer:

Explanation:

la reponse est le premier et le 3 eme pointcar en effet le premier point c est logiqye e le 2 e aussi  

why does my ps4 keep disconnecting from the internet

Answers

Answer:

It could be a variety of reasons depending on your form of connection. Wireless, it could be distance from router causing packet loss or disconnection. Wired, damaged or poor wire, or bad internet. What do you know about your connection?

Which type of wireless attack is designed to capture wireless transmissions coming from legitimate users

Answers

A type of wireless attack that is typically designed and developed to capture wireless transmissions coming from legitimate end users is referred to evil twin.

An evil twin can be defined as an illegitimate and fraudulent that is usually set up to capture wireless transmissions, especially by eavesdropping on the information transmitted by legitimate end users.

In Cybersecurity, an evil twin is an equivalent of phishing on a local area network (LAN).

Basically, an evil twin is a rogue wireless access point (AP) that is typically designed and developed to capture wireless transmissions and sensitive information coming from legitimate end users.

In conclusion, an evil twin is used by an attacker or hacker to gain an unauthorized access to sensitive information from legitimate end users.

Read more: https://brainly.com/question/5660386

A facility that is pre-wired for necessary telecommunications and computer equipment, but doesn't have equipment installed, is known as a

Answers

Answer:

hot site

Explanation:

Which of these problems is correct if the numbers are binary numbers?Group of answer choices1 + 1 = 21 + 1 = 100 + 0 = 11 + 0 = 10

Answers

Answer:

The last one is correct.  

Explanation:

difference between boot disk and booting in 5 points​

Answers

[tex]Answer \: -[/tex]

In computing, booting is the process of starting a computer. It can be initiated by hardware such as a button press, or by a software command. After it is switched on, a computer's central processing unit (CPU) has no software in its main memory, so some process must load software into memory before it can be executed. This may be done by hardware or firmware in the CPU, or by a separate processor in the computer system.

A boot disk is a removable digital data storage medium from which a computer can load and run an operating system or utility program. The computer must have a built-in program which will load and execute a program from a boot disk meeting certain standards.

what is the term for delivering an application over the internet called?

Answers

Answer:

Cloud computing

Explanation:

The termnology which is used to describe the delivering of an application over the internet is called SaaS.

What is SaaS?

SaaS is an acronym for Software as a Service and it can be defined as a type of cloud computing delivery model that typicaly involves developing and making licensed software applications available to end users on a subscription basis and over the Internet, especially by centrally hosting these software applications within the cloud or through a third-party (vendor).

This ultimately implies that, Software as a Service (SaaS) is a termnology which is used to describe the delivering of an application over the internet.

Read more on SaaS here: https://brainly.com/question/24852211

Pls help me pls I’m struggling

Answers

Answer:Turn Right () Degrees (block)

The turn right () degrees block is a Motion block and a stack block. The block turns its sprite's direction the specified amount of degrees clockwise.

Who is your favorite Funtime Anamatronic?

Answers

Answer:

ur mom

Explanation:

jk it's prb something like foxy

which subunit of a heterodimeric cdk is the regulatory subunit?

Answers

The answer is cyclin subunit

What is the main difference between structured and unstructured data?

Answers

Answer:

answer is 4.

Explanation:

for an instance let's say you've got to make list of students who would stay after school for sports.then you have to collect data such as Student name _gender _the sport he or she will attend to. Then you get three columns of table to do that when you write those you can get a clear information seeing those data..

Which of the following would be the most appropriate way to define a method that calculates and returns the final price, after tax and tip, for a passed in price, assuming tip is always 15% and tax is always 8%?

a. public double getFinalPricel double tips, double tax).
b. public double getFinal Price double tax)
c. public double getFinalPrice/double basePrice, double tips)
d. public double getFinalPrice double basePrice, double tips, double tax)

Answers


D. I hope it helped

Brianna is taking a backpacking trip in the wilderness and wants to back up the photos from her camera. Which type of storage device would be best for this purpose?
A. Optical disc
B. Cell phone
C. Flash drive
D. HDD

Answers

Answer:

C

Explanation:

Flash drives usually have an input (E.G. one of those android charger connectors), so just plug that into your camera, and load the flash drive with the photos. Then go home and plug the USB on the flash drive into your PC. If there isn't already, a folder will be made in your "Pictures" folder on your PC, to which you can open the folder, and then your photos should be there. From there you can open them, print them, etc.

Hope this helped, and sorry if I didn't answer in time.

According to popular science Web sites, the scientific process of digital forensics normally starts with a(n) ________.

Answers

Answer:

a hypothesis that forms into a question.

Explanation:

A PIN of four digits has 10,000 (or 104) combinations. This could theoretically be guessed by a computer in milliseconds. The most popular PIN numbers are 1111, 1234 and 0000 making up around 20% of PIN numbers. Anything beginning with 19XX is also very common, as is 2580. Why?

Answers

Answer:

19xx could be a birth year, easy to remember

2580 is easy to remember because on a keypad the numbers are aligned vertically.

Note that from the statement above, one can say that 19xx is common as it is linked with birth year and thus easy to recur and also 2580 is very easy to recur because on a keypad the numbers are soften matched vertically.

What is pin about?

Pin or digit code are often used in our debit cards, credit cards and in a lot of mobile phones for security purposes.

Note that Note that from the statement above, one can say that 19xx is common as it is linked with birth year and thus easy to recur and also 2580 is very easy to recur because on a keypad the numbers are said to be aligned vertically.

Learn more about digits code from

https://brainly.com/question/3118454

#SPJ9

List three (3) features of first generation computer
PLEASE HELP!!!!!

Answers


Features of first generation computers:

Technology used: vacuum tube.

Machines languages were used to instruct the computer.

Magnetic core memory was used as primary memory.

Electrostatic tubes, Parer tape, punch card, magnetic tape.

about how many smart devices are active today coinbase

Answers

Considering the latest information released by Statisticà, the number of active smart devices in the world today is 21.5 billion.

What is Smart Device?

Smart Device are generally known as electronic devices, that have the capacity to connect with other device or networks through wireless servers like Bluetooth, Zigbée, NFC, Wi-Fi, LiFi, 5G, etc.

Examples of Smart Devices

Smart devices generally include the following:

SmartphonesSmart cars Smart doorbellsSmart refrigeratorsTabletsPCSmart watches, etc.

Hence, in this case, it is concluded that the correct answer is 21.5 billion.

Learn more about Smart Device here: https://brainly.com/question/24803254

Other Questions
List any 10 kpop songs name...No jpt message!!!! hii pls help me to balance the equation and state the symbols thankss Two children (each having a mass of 60 kg) are standing on the edge a merry-go-round (mass of 140 kg) as it spins with an angular velocity of 0.75 rad/s. The two children jump off the merry-go-round. What is the angular velocity of the merry-go-round after the children have jumped off how to graph quadratic relationship for h(x)=(x-1)^2-9 What tye of society do you prefer to live in? give any 4 reason write a essay on the road ahead after the pandamic gets over (200 words). a im A c gc nhp x lc 12gi vo ngy 22/6 l 5828'. Hy xc nh v a l ca A. Which of the following oxides is amphoteric oxide?A)Na2O B)Al2O3 C)MgOD)SO2 Why is oiling done time and again in a sewing machine? "Idaho Mining, Inc. borrows at prime plus 1.5% on its line of credit. The line requires a 15% compensating balance. If the prime rate is 9% and Idaho Mining plans on borrowing for a period of one year, what is the nominal APR of the line of credit?" Max is a college student who spent more time partying than studying. As a result, he has failed his latest semester of courses. It will now take him longer to graduate because he will have to repeat the courses that he failed. He wants to improve his grades, but he is completely unmotivated. This is an example of what kind of obstacle Who stops Tybalt from attacking Romeo at the feast in Romeo and Juliet?A. The Nurse B. BenvolioC. Capulet D. Juliet define tourism profession Identify the decimals labeled with letters A B and C on the scale Madame Leblanc est...... d'Hlne.la mrele professeur Give reasons. a. Troposphere is affected maximum by human activities. Which is the strongest claim for a presentation about the global problem of a lack of clean drinking water? It is interesting to note that 82% of people who lack access to improved water live in rural areas, while just 18% live in urban areas. Everyone deserves access to clean drinking water, but it is unlikely that this goal can ever be reached. The United States is one of the many countries that are very lucky to have access to well water, bottled water, and tap water. The lack of access to clean drinking water poses a serious health risk around the world, and funds must be raised to help achieve universal access. Which groups of Athenians were able to vote? Which groups were not able to vote? The shape of a molecule is determined by:A. All of theseB. The number of electron clouds around the atom.C. The number of bonds.D. Mutual repulsion between electrons. Consider the quadratic expression 13x^2 + nx - 17. For certain values of n, it may be factored into a product of two linear polynomials, both of which have integer coefficients. What are all such values of n?