1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Harman [31]
4 years ago
10

How do you change your password on this? This isn’t really a “Question” but....

Computers and Technology
2 answers:
SCORPION-xisa [38]4 years ago
6 0
Under your username you click edit and it gives you options.  Click on password and type your password in and there.
MissTica4 years ago
5 0
You go to edit profile and press the change password button.  click on profile pic
You might be interested in
What font family is Times New Roman an what font family is Arial?
Alexxandr [17]

Answer:

Some Font Examples

Generic Font Family                 Examples of Font Names

Serif                    Times New Roman Georgia Garamond

Sans-serif                          Arial Verdana Helvetica

Monospace                     Courier New Lucida Console Monaco

Cursive                        Brush Script MT Lucida Handwriting

Explanation:

hope it help

4 0
3 years ago
Read 2 more answers
Write a main function to do the following: Create a string that can hold up to 30 characters. Create an array of 10 strings with
masha68 [24]

Answer:

Check the explanation

Explanation:

#// do comment if any problem arises

//code

#include <stdio.h>

#include <ctype.h>

#include <string.h>

#include <stdlib.h>

void read(FILE *input, char array[10][61])

{

   // read all 10 strings

   for (int i = 0; i < 10; i++)

       fgets(array[i], 60, input);

}

void remove_newline(char array[10][61])

{

   for (int i = 0; i < 10; i++)

   {

       array[i][strlen(array[i]) - 1] = '\0';

   }

}

void smallest(char array[10][61])

{

   int s = 0;

   for (int i = 1; i < 10; i++)

   {

       if (strlen(array[s]) > strlen(array[i]))

           s = i;

   }

   printf("\nSmallest strnig: %s\n", array[s]);

}

void upper(char array[10][61])

{

   for (int i = 0; i < 10; i++)

   {

       int n = strlen(array[i]);

       for (int j = 0; j < n; j++)

       {

           array[i][j] = toupper(array[i][j]);

       }

   }

}

int main()

{

   char filename[30];

   // array of 10 strings

   char array[10][61];

   printf("Enter filename: ");

   gets(filename);

   // open file

   FILE *input = fopen(filename, "r");

   // read into array

   read(input, array);

   // close file

   fclose(input);

   // remove newline

   remove_newline(array);

   // print

   printf("Contents of file:\n");

   for (int i = 0; i < 10; i++)

       printf("%s\n", array[i]);

   // print smallest string

   smallest(array);

   // uppercase

   upper(array);

   // print again

   printf("\nContents of file after converting to uppercase:\n");

   for (int i = 0; i < 10; i++)

       printf("%s\n", array[i]);

}

kindly check the attached image below to see the Output:

6 0
4 years ago
What is the most accurate way to describe the excerpt?
kifflom [539]

choose the option it is a dependent clause

7 0
4 years ago
Read 2 more answers
How are envelopes and letterheads different
choli [55]
Envelope - a flat paper container with a sealable flap, used to hold a small letter or document.

letterhead - a printed heading on stationery stating a person's or organization's name and address. A letterhead is very important when it comes to businesses.

Hope this helps! =D
8 0
4 years ago
U.S. cybersecurity experts and government officials are increasingly concerned about breaches from __________ into corporate net
Triss [41]

Answer:

Organized crime syndicates based in the United State

Explanation:

U.S. cybersecurity experts and government officials are increasingly concerned about breaches from organized crime syndicate based in the United States into corporate networks, either through mobile devices or by other means.

The crime syndicate can go to any length to access corporate network through mobile device or any other means in order to commit crimes that is why the US cyber security expert and government officials are increasingly concerned.

Cyber security specialists or expert in the US are been employed to protect information or data that the crime syndicate may want to gain access to by using different variety of techniques by critically monitoring the systems network for attempted breaches by the crime syndicates and then dealing with any of them that is found guilty.

5 0
3 years ago
Other questions:
  • Leah wants to create a PowerPoint presentation for a history report about the progressive era in the 1900s. To
    6·2 answers
  • Hich function would be used to remove a section of text from a document?
    12·1 answer
  • . char values are surrounded by _____ quotes
    15·1 answer
  • A honeypot is sometimes called a(n) __________.
    11·1 answer
  • Which of the following functions grows at a faster rate than the rest? (Points : 6)
    12·1 answer
  • For each of the following polynomials, apply either the Muller's method or the Bairstow's method to find all real or complex roo
    15·1 answer
  • Sequence encryption is a series of encryptions and decryptions between a number of systems, wherein each system in a network dec
    9·1 answer
  • Read the section, "Junior Year." Why would someone chose to complete an apprenticeship after high school? How many occupations c
    14·2 answers
  • Tower of Hanoi algorithm 4 disks
    12·2 answers
  • Data elements in a relational database are organized into ____
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!