1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
victus00 [196]
3 years ago
14

How do you detect my account for brainly?

Computers and Technology
1 answer:
rewona [7]3 years ago
3 0

Answer:

do you mean delete

Explanation:

You might be interested in
What layer in the Transmission Control Protocol/Internet Protocol (TCP/IP) model is responsible for defining a way to interpret
sweet-ann [11.9K]

Answer:

The data-link layer

Explanation:

The physical layer and data-link layer are often confused a lot especially in terms of what they do in the TCP/IP 7 layer protocol. The physical layer as the name suggests represents the physical devices like the cables and the connectors that join or interconnect computers together. This layer is also responsible for sending the signals over to other connections of a network. The data-link, on the other hand, translates and interprets these sent binary signals so that network devices can communicate. This layer is responsible in adding mac addresses to data packets and encapsulating these packets into frames before being placed on the media for transmission. Since it resides in between the network layer and the physical layer, it connects the upper layers of the TCP/IP model to the physical layer.

3 0
4 years ago
Which factors have led to the fast growth in IT​
-Dominant- [34]

Answer:

Factors influencing population growth

Economic development. ...

Education. ...

Quality of children. ...

Welfare payments/State pensions. ...

Social and cultural factors. ...

Availability of family planning. ...

Female labour market participation. ...

Death rates – Level of medical provision

7 0
3 years ago
A presenter selects multimedia materials primarily based on their ability to
Kisachek [45]
A presenter selects multimedia materials primarily based on their ability to emphasize a point.
7 0
3 years ago
Read 2 more answers
What would happen if the bitmap or free list containing the information about free disk blocks was completely lost due to a cras
masha68 [24]

Answer:

It can be repaired with disk utility / recovery algorithms

In UNIX it can be done by scanning

In FAT file scan the FAT looking for free entries

Explanation:

When the crash happens, it is not a problem for UNIX and FAT file system

It can be repaired with disk utility/recovery algorithms.

The recovery algorithm is a list of all blocks in all files and takes a compliment as new free file.

In UNIX scanning can be done at all I-nodes.

In FAT file problem cannot occur because there is no free list .If there was any problem than it would have to be done to recover it to scan the FAT looking for free entries.

7 0
3 years ago
Consider the following 3-PARTITION problem. Given integers a1; : : : ; an, we want to determine whether it is possible to partit
ZanzabumX [31]

Answer:

Explanation:

Find attach the solution

6 0
3 years ago
Other questions:
  • A cracked tone (reluctor) ring will often cause what type of problem
    13·1 answer
  • Please reply only in CORAL. I am not sure how to get the numbers between the negative version and positive version of the input
    10·1 answer
  • Who can effectively use website authoring software?
    6·1 answer
  • Write a program that has the following String variables: firstName, middleName, and lastName. Initialize these with your first,
    7·1 answer
  • If the moon disappeared, what effect would this have on the Earth’s tides?
    15·1 answer
  • Assume the method doSomething has been defined as follows: public static void doSomething (int[] values, int p1, int p2) { int t
    6·1 answer
  • A) A cable that is mainly used in the cable television network
    11·1 answer
  • Using the same Apple ID for multiple devices will definitely sync them all together <br> True/False
    7·2 answers
  • Anyone know how to do point hack​
    9·2 answers
  • The input to the function/method consists of two arguments.<br><br> a. True<br> b. False
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!