1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hunter-Best [27]
2 years ago
10

Where is the "delete account" button in my profile? And please give me a legit answer and not just a word.

Computers and Technology
2 answers:
ipn [44]2 years ago
7 0

Answer:

tap the me symbol then go to settings then tap log out

N76 [4]2 years ago
3 0

Answer:

in your profile for brainley ??

You might be interested in
A virus has attacked your hard drive. Instead of seeing the Windows Start screen when you start up Windows, the system freezes a
Yanka [14]

Answer:

Boot to safe mode

Explanation:

When a virus attacks boot system, that is to say, Windows program won´t load. The following steps should be considered taking into account what Windows Version is being used, Windows 7, 8 or 10:

1. Press  F8 (Windows 7) F4 (Windows 8, 10)

2. Enable Safe Mode

3. Run Safe Mode

4. Once in safe mode the user will have access to Windows and eventually document files can be extracted via pendrive.

5 0
3 years ago
Discussion Question 10: A bank in California has 13 branches spread throughout northern California , each with its own minicompu
GuDViN [60]

Answer:

The system that will be more prone to attack or vulnerability is the  bank that has ten branches spread throughout California with the data being stored on a mainframe in San Francisco.

Explanation:

Solution

If the databases are not shared by all the branches throughout the network, they could not be hacked or accessed easily. but when the systems are in a network and share databases or resources,then these could be more vulnerable  to unauthorized persons or individuals.

The data been stored on a mainframe in San Francisco that is a centralized access by 10 branches of another bank. what this implies is that networking is involved or used to share data.

With this example, the chances of vulnerability or attacks increases from the following :

  • Accounts payable could be disturbed by changing cash in payment false.
  • Entering incorrect data into the system. such transactions can be altered, deleted by unauthorized persons.
  • Transaction fraud like hacking, masquerading are very common in a networked system.
3 0
3 years ago
Write an SQL statement to display full name of employees supervised by the manager whose ID is 105. Note that full name includes
Ghella [55]

Answer:

SELECT CONCATENATE(FIRST_NAME, " ", LAST_NAME) as FULL_NAME FROM TABLE_NAME WHERE MANAGER_ID = 105;

Explanation:

SELECT IS THE KEYWORD TO FETCH DATA

CONCATENATE combines FIRST_NAME, " " AND LAST_NAME and displays as FULL_NAME

TABLE_NAME is the name of the table containing the data

MANAGER _ID is the name of the column containing the manager id data

8 0
3 years ago
Read 2 more answers
Tricking someone to reveal personal information, passwords, and other information that can compromise a security system is known
Evgen [1.6K]
No it is not broadcast on stations overseas but on overseas military base stations it can sometimes be found.
6 0
3 years ago
One of the most basic agricultural tools is the tractor, which is designed to break up the soil in order to prepare it for plant
melisa1 [442]
False because the tractor doesn’t break up the soil
4 0
3 years ago
Other questions:
  • Which statements describe the advantages of using XML?
    12·2 answers
  • Which layer defines an interface that applications can use to request network services, rather than referring directly to applic
    5·1 answer
  • List and describe three options in the autocad object snap toolbar
    8·1 answer
  • Monica is teaching herself to paint. What web resource would be the most helpful
    14·1 answer
  • What can u access various sites on
    12·1 answer
  • On the Attendance worksheet, in cell L5, enter an IF function to determine if the percentage in cell K5 is greater than or equal
    9·1 answer
  • Which of the following represents knowledge as a set ofâ rules? A. Neural networks.B. Machine learning systems.C. Robotics.D. Ex
    11·1 answer
  • Match the hardware device with the "category" into which it falls. Remember to choose
    8·1 answer
  • Write a program to output the following quote by Edsger W. Dijkstra:
    6·2 answers
  • An attacker is preparing to perform what type of attack when the target vulnerabilities include headers and payloads of specific
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!