1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rudik [331]
4 years ago
14

How do I logout of Brainly on mobile? When I went to settings, it had the option to log out but it was grayed out.

Computers and Technology
1 answer:
poizon [28]4 years ago
8 0
Just delete the app
You might be interested in
Barry discovers that an attacker is running an access point in a building adjacent to his company. The access point is broadcast
Kamila [148]

Answer:A) Evil twin

Explanation: Evil twin is a type of attack that happens in the network. This behaves as the alias wireless access point(WAP) which appeals toward users to get connected with false hotspot to steal their personal information.This attack is based on the rogue hotspot .Barry has also faced a evil twin attack while passing by a building and getting his device connected with fake hotspot.

Other options are incorrect because war driving is searching for the internet connectivity while driving,blue snarfing is done with Bluetooth to steal personal data and replay attack in which the transmitted data is repeated in malicious way.Thus, the correct option is option(A).

8 0
3 years ago
Directions: There are 9 basics principles that you must find a match for each design. Look for an image picture to match to copy
Marat540 [252]
I don’t get what u want me to do?
4 0
3 years ago
Please make a list of six machines. Three of the machines should be electric and three of the machines should be non-electric or
Black_prince [1.1K]

Answer:

calculator-non electric:for making calculations-has computer in it

7 0
3 years ago
Which of the following is an example of a goal? *
zhenek [66]

i would say d! sorry if im incorrect <3

6 0
3 years ago
How are switches indirectly involved in ARP poisoning?
Ivan
They
are indirectly involved in the attack because they do not verify the the MAC/IP address
association
6 0
3 years ago
Other questions:
  • Intranets and extranets to are primarily used in homes, not businesses or organization
    12·2 answers
  • A user has been given Full Control permission to a shared folder. The user has been given Modify permission at the NTFS level to
    11·1 answer
  • What are some of the advantages of online marketing versus other forms of advertising?
    11·1 answer
  • Text that does not fit in a cell
    7·1 answer
  • Match the ocean floor feature with its characteristic.
    6·1 answer
  • Write a C++ program that computes student grades for an assignment as a percentage given each student's score and the total poin
    12·1 answer
  • The term generally used to describe storage systems that function at high speeds is:
    12·1 answer
  • Write a loop that displays your name 10 times. 2. Write a loop that displays all the odd numbers from 1 through 49. 3. Write a l
    5·1 answer
  • Please answer ASAP!!!!!!
    15·1 answer
  • 1. While researching online, you come across an article that prominently displays the author's name. This source is likely to ha
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!