1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gladu [14]
3 years ago
7

Can we change our profile name on here and how

Computers and Technology
2 answers:
ryzh [129]3 years ago
5 0

Answer:

You would have to make a new account.

Explanation:

TiliK225 [7]3 years ago
4 0
Only by making a new account
You might be interested in
How do you put text in MS publisher?<br><br> When do you use text wrapping?
coldgirl [10]
First question: On the Format tab, in the Arrange group, click Wrap Text. Do one of the following: Click Square to wrap text around the border of your image. Click Tight to wrap text closely around an irregularly shaped picture.


Second question: you use text wrapping when you want to surround a picture or diagram with text.

Hope this helps!
7 0
3 years ago
Instagram
Aleonysh [2.5K]
Uninstall instagram and install it again. log in and go to settings and fix up the notifications maybe that’ll work??

if it doesn’t, go to your apple settings and see if the notifications for instagram are on.

also try shutting your phone off for a few seconds if you do either one.
5 0
3 years ago
Elizabeth works for a local restaurant at the end of her shift she read she’s required to write in the time that she arrived in
gavmur [86]
B - because you should always be honest when it comes to working your hours and getting paid the right amount.
5 0
3 years ago
What are the three fundamental elements of an effective security program for information systems?
marishachu [46]
<span>the three fundamental elements of an effective security program for information systems are Identification, Authentication and Authorization.The access control creates the user and assigns the rights to resources and authorization is giving permissions to the users to access the resources.The user who wants to enter the system should have a valid data t enter the system like password, fingerprint or any other type of recognition.</span>
4 0
3 years ago
Read 2 more answers
Question 5 (frue/False Worth 3 points)
azamat

<em><u>true</u></em>

Explanation:

<em><u>because</u></em><em><u> </u></em><em><u>logical</u></em><em><u> </u></em><em><u>errors</u></em><em><u> </u></em><em><u>are</u></em><em><u> </u></em><em><u>made</u></em><em><u> </u></em><em><u>to</u></em><em><u> </u></em><em><u>be</u></em><em><u> </u></em><em><u>unexpected</u></em><em><u> </u></em><em><u>it</u></em><em><u> </u></em><em><u>was</u></em><em><u> </u></em><em><u>before</u></em>

5 0
3 years ago
Other questions:
  • What privacy issues have arisen with webcams in mobile devices?
    8·1 answer
  • If you work up to your potential but fall short of your goals, you
    15·2 answers
  • I NEED HELP NOW PLEASE!!!!!!
    6·2 answers
  • Most large organizations store data through a strategy called a(n) ________ to promote efficient and safe use of data across the
    11·1 answer
  • What is the name for the type of flash memory that is used by mobile devices to store their apps and data?
    6·1 answer
  • Write a Unix (Linux) find-like command (myFind) in Python3 where the function will return the full paths of all the files contai
    9·1 answer
  • A ______________ is a way of taking a screenshot or a picture of your computer screen. ​
    14·1 answer
  • 69696969696969696969696969696969696969696969696969696969696969696969696969696969696969696969696969696969696969696969696969696969
    8·1 answer
  • Write an algorithm to find the average of three numbers: 10, 20, 30
    7·1 answer
  • identify the difficulties with the k-nearest neighbor algorithm. a. both a and b b. calculate the distance of the test case from
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!