1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nevsk [136]
2 years ago
8

Give two examples of safe, professional usernames. (1-2 sentences)

Computers and Technology
1 answer:
erastovalidia [21]2 years ago
5 0

Answer:

Safe username

Explanation:

OKNGR$#1133

PLMOKNG^&*89

You might be interested in
What is a web client ​
Anna [14]

Explanation: It's something like siri. It's a machine or technology inside a phone or computer that gives you information to a question that you asked.

5 0
3 years ago
Read 2 more answers
What do to keep in a database
igor_vitrenko [27]
<span>Customer Relationship Management is really important for many businesses, in particular, small ones, as it is the focus point of sales and marketing strategies. At the centre of a business’ CRM is their customer database, which is a really helpful tool enabling them to; identify customer trends, create customer loyalty and increase their customer communication. All businesses have a customer database, whether it is a computerised system or a piece of paper with names and details written on. Here are some tips on how to create and maintain your database in order to get the most out of it.</span>
5 0
3 years ago
Read 2 more answers
Match the graph with the best description of the relationship it shows.
igomit [66]

Answer:

there is no graph

Explanation:

3 0
3 years ago
Most panoramic photography focuses on what subject?
Verizon [17]
Landscapes is the correct answer. Just google it and click images.
4 0
3 years ago
Read 2 more answers
APPLY
tatiyna

Answer:

i<6 is the "end guard". This means that the loop continues while this is true, and ends when this is false.

i++ is the "continuation", it is the operation executed when the loop continues. i++ increases the value of i by one.

4 0
2 years ago
Other questions:
  • You have been asked to create an authentication security plan for your company. Which of the following components would you inco
    14·1 answer
  • Pros and cons of Processor Throttling or Scaling?
    13·1 answer
  • All of the following items could be too expensive for someone with only a high school degree to afford except
    6·1 answer
  • Which of the following would most likely be responsible for configuring firewalls and IDPSs, implementing security software, and
    8·2 answers
  • A cache has been designed such that it has 512 lines, with each line or block containing 8 words. Identify the line number, tag,
    7·1 answer
  • What disese is sue suffering from
    15·2 answers
  • Which of the following is NOT a factor of identifying graphic design?
    10·2 answers
  • How can I download music and films at home without breaking the law?
    11·2 answers
  • Explain different types of networking-based attacks
    5·1 answer
  • Classify computer based on signal
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!