1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gladu [14]
3 years ago
7

Can we change our profile name on here and how

Computers and Technology
2 answers:
ryzh [129]3 years ago
5 0

Answer:

You would have to make a new account.

Explanation:

TiliK225 [7]3 years ago
4 0
Only by making a new account
You might be interested in
LEARNING TASK 3 about: REAMING THE RIGID STEEL CONDUIT.
devlian [24]

Answer:

1.I have learned that my teacher is a good teacher

2.I have realized that my name is beautiful

Explanation:

thats right? hope it's help you heart me and please give brainlesst

3 0
2 years ago
Write the Python programs for the
ArbitrLikvidat [17]

Answer:

num = int(input("Enter a number: "))

if (num % 2) == 0:

print("{0} is Even number". format(num))

else:

print("{0} is Odd number". format(num))

4 0
3 years ago
How are the number of rows calculated.​
Eva8 [605]

Answer:

ROWS function

Explanation:

Hope this helped

6 0
3 years ago
Add the following numbers in abacus 2436+9214​
bazaltina [42]

Answer:

the answer is - 11,650

Explanation:

you study abacus too ?

4 0
3 years ago
A security administrator is reviewing the following information from a file that was found on a compromised host: Which of the f
Roman55 [17]

Answer:

C. Trojan

Explanation:

In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.

This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.

In this scenario, a security administrator is reviewing the following information from a file that was found on a compromised host: "cat suspiciousfile.txt."

Some of the ways to prevent vulnerability in a network are;

1. Ensure you use a very strong password with complexity through the use of alphanumerics.

2. You should use a two-way authentication service.

3. You should use encrypting software applications or services.

8 0
3 years ago
Other questions:
  • Which presentation software element can you use to create a model diagram with two concentric circles inside a triangle?
    10·2 answers
  • The procedure call mystery(38) will yield which output? __________ a) 0 12 b) 12 0 c) 1 1 0 2 d) 1 1 1 1 e) 2 0 1 1 public void
    11·1 answer
  • Can someone tell me a user to an admin on brainly I got a person sending "inappropriate pictures" all over brainly
    13·1 answer
  • You can combine the algorithms for converting between infix to postfix and for evaluating postfix to evaluate an infix expressio
    13·1 answer
  • An inventory clerk, using a computer terminal, views the following on screen: part number, part description, quantity on hand, q
    8·1 answer
  • 6 external parts of computer
    10·2 answers
  • Windows Rights Management Services is used in conjunction with which Microsoft applications?
    11·1 answer
  • Why is a computer called"a computer"?​
    12·2 answers
  • Why isn't image display working on wacom tablet.
    8·1 answer
  • In the software development process, which review studies the software design before it is released for coding?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!