1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andreas93 [3]
3 years ago
13

How can I change my username here at brainly?

Computers and Technology
2 answers:
krok68 [10]3 years ago
8 0

Answer:

Hi

Explanation:

Sorry u cant unless if u create a new email and a new brainly account.

I know its very difficult but ya sorry

God bless ya'll, stay safe, have a great day!!!!!!!!!!  :)

-<em>Emilee</em>

velikii [3]3 years ago
3 0

Answer:

Explanation:

LOG OUT AND CHANGE IT

You might be interested in
In order to look up ipv4 and ipv6 dhcp leases, what two files should be viewed?​
Zigmanuir [339]
The answers are  /var/lib/dhcpd/dhcpd.leases   &                                                                       /var/lib/dhcpd/dhcpd6.leases
In order to look up ipv4 and ipv6 dhcp leases, The two files that should be viewed are  /var/lib/dhcpd/dhcpd.leases &  /var/lib/dhcpd/dhcpd6.leases                                             
7 0
2 years ago
The "fathers of the internet" are vinton cerf and ________.
Harrizon [31]
Robert E Kahn I hope this helps
8 0
2 years ago
Advantages of monolithic operating system? ​
Lyrx [107]

Advntage:

provides CPU scheduling, memory management, file management, and other operating system functions through system calls. The other one is that it is a single large process running entirely in a single address space.

Disadvantage: if anyone service fails it leads to an entire system failure

8 0
1 year ago
When troubleshooting a computer hardware problem , which tool might help​
kirill115 [55]

Answer:

Some softwares by microsoft or windows maybe :)

Explanation:

4 0
3 years ago
In which encryption strategy is the plaintext encrypted one character at a time and each encrypted character depends on that sin
Natasha_Volkova [10]

Answer:

Caesar cipher

Explanation:

In formation technology, cryptography or cryptology is a process of coding or encrypting information, using algorithms and input values in a network, where there is a present of a third party called adversaries or attackers.

There are different types of cryptography, namely, symmetric, assymmetric and hash cryptography.

Ciphers are algorithms used in cryptography to encode (encrypt) or decode (decrypt) information. An example of cipher is the Ceasar's cipher.

Ceasar cipher is a simple type of substitution cipher that encrpts plain text one character at a time and each coded character depends on the single character and a fixed distance value.

4 0
3 years ago
Other questions:
  • Henry bought a new card for capturing television on his computer. When he finished going through the packaging, though, he found
    5·1 answer
  • Which of the following tasks would a database administrator perform ? A identify computer security photos, B. Make sure protocol
    15·1 answer
  • In how many ways can the letters of the word APPROXIMATION be arranged?
    12·1 answer
  • Michale spent 80 minutes at the libary he finished studying at 4:00 what time did michale start studying
    8·1 answer
  • Plot element is typically the turning point in the most intense moment of a story
    8·1 answer
  • The Software Engineering Code of Ethics and Professional Practice was developed by Select one: a. Computer Professionals for Soc
    7·1 answer
  • What is meant by the phrase "backing up your data"?
    15·1 answer
  • Moving your Sprite top to bottom is moving along the X coordinate?
    5·1 answer
  • What would a world where we have 2^128 (340 undecillion) Internet connected devices look like? How could that much Internet usag
    7·1 answer
  • When you insert a new slide in a presentation, where is it placed in relation to the existing slides?.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!