1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zysi [14]
3 years ago
6

How to reset your password if you changed your email and dont remember password?

Computers and Technology
1 answer:
DanielleElmas [232]3 years ago
8 0
Oof... Contact your email provider and give them the last email you had. They will most likely ask you security questions. Hope that helped!
You might be interested in
A file manager is used for all of the following except ____. A. to move files and folders B. to reorder files and folders C. to
Alex73 [517]

Answer:

A .to move files and folders

5 0
4 years ago
Read 2 more answers
List 3 characteristics of the ideal encryption scheme
JulsSmile [24]
Three characteristics of an ideal encrytion scheme are:
1. The encryption sheme should be strong: the algorithm is imprevious to direct attack and attempts are derived.
2. The encryption scheme should create unique ciphertext from the same plaintext for each key permutation, among other traits.
3. It should take at least millions of years to break ideal encryption scheme, based on mathematical predictions.
6 0
3 years ago
Read 2 more answers
A clock is reading 10:27:54.0 (hr:min:sec) when it is discovered to be 4 seconds fast. Explain why it is undesirable to set it b
lara31 [8.8K]

Answer:

(a)Applications Time Stamp Events

(b)S=0.5(W-T_{skew})+T_{skew}, where T_{skew}≤W≤T_{skew}+8.

Explanation:

Some applications assume that clocks always advance, so they could timestamp events under this assumption.

In our case we have the wrong timed clock, say W and the hardware clock H which is supposed to advance at a perfect rate.

We proceed to construct a software clock such that after 8 seconds we can replace the wrong timed clock with the software clock in good conditions.

Let us denote the software clock with S.

Then, S=c(W-T_{skew})+T_{skew} where:

T_{skew}=The current Time(10:27:54) and;

c is to be found.

We already know that S=T_{skew}+4 when W= T_{skew}+8,

So:

S=c(W-T_{skew})+T_{skew}

T_{skew}+4=c(T_{skew}+8-T_{skew})+T_{skew}

4=8c

c=0.5

We obtain the formula

S=0.5(W-T_{skew})+T_{skew}, where T_{skew}≤W≤T_{skew}+8.

4 0
3 years ago
Consider the following code:
pishuonlain [190]

In python the % operator is modulo. Modulo returns the remainder of two numbers.

19 % 5 = 4 therefore,

print(x%y) would output 4

7 0
3 years ago
Received a $600 utility bill for electricity usage in july to be paid in august.
Marizza181 [45]
I guess the answer would be B if it was a choice.
<span>b. owed wages to 10 employees who worked three days at $100 each per day at the end of July. the company will pay employees at the end of the first week of august.</span><span />
5 0
3 years ago
Other questions:
  • Select the correct answer.
    9·2 answers
  • _____ separation strategies (e.g., attacking and sabotaging others) are used by those for whom co-cultural segregation is an imp
    5·1 answer
  • Who develop punch card​
    7·1 answer
  • Need help with just #8
    12·1 answer
  • Your computer will organize files into
    6·2 answers
  • Technician A says that as volume decreases, pressure increases. Technician B says that as temperature increases, pressure decrea
    15·2 answers
  • Given the statement: int list[25]; The index can go from 0 to 25 inclusive withoutgoing beyond the end of the array.true or fals
    14·1 answer
  • Select all that apply.
    12·1 answer
  • What is the action of extracting data fragments and then reassembling them in order to recover a file?.
    10·1 answer
  • True or false. The send e-mail feature, listed under tools, will allow you to send an e-mail to your instructor and to fellow st
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!