1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
FromTheMoon [43]
3 years ago
14

ALGUEM SABE COMO MUDA O NOME DE PERFIL!?!?!? SE SOUBER ME AJUDA!!

Computers and Technology
1 answer:
Delicious77 [7]3 years ago
4 0

Answer:

The following are the steps to change the profile name.

Explanation:

In the given question it is not defined in which we change the profile name.so, we define the steps to change the profile name social media like (Face book).

  • first of all, login into your account with your id and password.
  • After login go to the setting bar, this bar is available on the top right corner.    
  • After opening the setting go to the general setting option and open it.
  • In the general setting option, It provides name, username, and contact options in these options we update the profile name.  
  • To update the profile name we click on the edit link in which it opens the edit panel. After writing the name select the save changes button to save the profile name.
You might be interested in
Weak passwords are a(n) ___________ threat
enot [183]

Answer: Employee

Explanation:

3 0
2 years ago
How can you download and install optional Windows updates?
kati45 [8]

Answer:

Check your settings for possible updates and it will also remind you too. It depends on what kind of computer you have.

8 0
4 years ago
Investigations involving the preservation, identification, extraction, documentation, and interpretation of computer media for e
Goryan [66]

Answer:

The correct answer to the following question will be "Digital Forensics".

Explanation:

  • Digital forensics is a field of forensics that involves the analysis and retrieval of materials found in electronic devices, sometimes related to cybercrime.
  • The objective of digital forensics methodologies would be to check, maintain and evaluate evidence on computing systems to find possible evidence for a trial. In the initial days of computing, an individual investigator could process files because the power consumption was so small.

Therefore, Digital Forensic is the right answer.

7 0
4 years ago
_____ is a method of access control that prevents unauthorized users from using an unattended computer to access the network and
Hoochie [10]

Answer:

Terminal Resource Security

Explanation:

Terminal Resource Security is a type of access control that prevents unwanted user from using a computer that is not in use to access the data and network. It is feature in a software that ensures that the screen of a computer is erased and a user is automatically signed off after a particular length of inactivity. It is used by many organizations.

5 0
3 years ago
Which graph or chart shows changes in the value of data?
yKpoI14uk [10]

Answer:

Bar graph and Pie chart

3 0
3 years ago
Read 2 more answers
Other questions:
  • The program has a compilation error because s is not initialized, but it is referenced in the println statement. The program has
    8·1 answer
  • Which of the following peripheral devices can be used for both input and output? mouse touch screen on a tablet computer printer
    5·1 answer
  • The Task Manager can be used ot track running _________________ .
    11·1 answer
  • 1. What runs horizontally and is identified with numbers?
    12·2 answers
  • Why do you think they added the wait .5 seconds block?
    13·1 answer
  • A final class can't be extended.<br><br> *True<br><br> *False
    9·1 answer
  • Rey is recording the dialogues and sound effects separately in the studio, as he is not happy with the sound quality recorded on
    9·1 answer
  • Nadia has inserted an image into a Word document and now would like to resize the image to fit the document befter. What is the
    11·1 answer
  • Implement one array of the English alphabet (26 characters). a) Create a function, getLetters() to cast and generate the array.
    5·1 answer
  • Create a defined name for range b6:e6 using walkup as the range name
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!