1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
umka21 [38]
4 years ago
11

How do i cancle my account on brainly

Computers and Technology
1 answer:
emmainna [20.7K]4 years ago
4 0

Answer:

VISIT YOUR ACCOUNT SETTINGS ON BRAINLY AND CLICK THE CANCEL SUBSCRIPTION BUTTON. If you cancel your subscription, you will have access to your subscription benefits until the end of the current billing period.

Explanation:

You might be interested in
"what is the common information listed under the ip section of pdu details as compared to the information listed under the osi m
frez [133]

Solution:

The common information listed under the ip section of pdu details as compared to the information listed under the osi model tab is Packet Tracer.

This simulation activity is intended to provide a foundation for understanding the TCP/IP protocol suite and the relationship to the OSI model. Simulation mode allows you to view the data contents being sent across the network at each layer. As data moves through the network, it is broken down into smaller pieces and identified so that the pieces can be put back together when they arrive at the destination. Each piece is assigned a specific name (protocol data unit [PDU]) and associated with a specific layer of the TCP/IP and OSI models. Packet Tracer simulation mode enables you to view each of the layers and the associated PDU. The following steps lead the user through the process of requesting a web page from a web server by using the web browser application available on a client PC.  Even though much of the information displayed will be discussed in more detail later, this is an opportunity to explore the functionality of Packet Tracer and be able to visualize the encapsulation process.

This is the required answer.

7 0
3 years ago
Data ________ is important because it establishes an organization's rules for sharing, disseminating, acquiring, standardizing,
photoshop1234 [79]

Data protection policy is important because it establishes an organization's rules for acquiring, standardizing and disseminating data.

<h3>What is Data protection policy?</h3>

These are policies adopted by organizations that help to ensure data is adequately protected.

When data isn't protected , it could get to the hands of criminals which could use it for different types of cybercrime and also to ensure compliance with data protection laws in the country.

Read more about Data protection policy here brainly.com/question/26493645

3 0
2 years ago
What is the last step to a URL search
Molodets [167]
U paste it the u press enter

4 0
4 years ago
7. Which cipher is based on the clues of the physical factors, rather than the hardware or a software cryptosystem
Stells [14]

Answer:

The concealment cipher.

Explanation:

A concealment cipher also known as null cipher can be defined as an obsolete encryption format that typically involves the mixture of plaintext with non-cipher elements. This ultimately implies that, the plaintext is hidden in another message through encryption.

The concealment cipher is based on the clues of the physical factors, rather than the hardware or a software cryptosystem.

Basically, the concealment cipher is solely dependent on the clues of the physical factors that mainly affects the sender and receiver in a communication system.

7 0
3 years ago
Any help , and thank you all
Paladinen [302]

Answer:

There are 28 chocolate-covered peanuts in 1 ounce (oz). Jay bought a 62 oz. jar of chocolate-covered peanuts.

Problem:

audio

How many chocolate-covered peanuts were there in the jar that Jay bought?

Enter your answer in the box.

Explanation:

3 0
3 years ago
Other questions:
  • What is a many-to many types of correspondence?
    5·1 answer
  • Describe the steps that transform a program written in a high-level language such as c into a representation that is directly ex
    8·1 answer
  • 20 POINTS!
    15·1 answer
  • Which type of device often controls IoT tasks?<br> Desktop<br> Laptop<br> Smartphone<br> Switch
    8·1 answer
  • A network administrator is attempting to troubleshoot an issue regarding certificates on a secure website. During the troublesho
    8·1 answer
  • Lost passwords set for documents in Microsoft® Word® documents can be retrieved in the backstage view. True False
    9·2 answers
  • Question #8
    5·1 answer
  • 7.3.4: Find the Error
    7·1 answer
  • (3 marks)
    7·1 answer
  • Additional rows and columns are inserted into a table using the
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!