1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ronch [10]
3 years ago
14

How do you change the username on here?

Computers and Technology
1 answer:
never [62]3 years ago
6 0

Answer:

I don't think you can. You can try to make an email that has the name you want and use that.

Explanation:

You might be interested in
Create and test an HTML document that describes nested ordered lists of cars. The outer list must have three entries: compact, m
melomori [17]

Answer:

Check the explanation

Explanation:

All website around the world/internet is a collection of different web pages, HTML can be referred to as the single most essential standard when it comes to web design, as well as it being the only one that’s enormously required or needed if you plan to create a web page.

to answer the question above, we will be creating an HTML document that describes nested ordered lists of cars, kindly check the attached images below to see the written codes to solve the question.

8 0
3 years ago
Which one of the following devices would you choose to meet those requirements?
tensa zangetsu [6.8K]
What are the requirements
5 0
2 years ago
Read 2 more answers
What are the charactaristic of computer with virus​
NISA [10]

Explanation:

One of the main characteristics of computer viruses is related to the fact that they are programs created by hackers that attack the code of a computer, infecting files on the computer's hard drive or its source code. Once the virus has been copied onto the computer, it can contaminate other computers that come into contact with the machine.

5 0
3 years ago
Read 2 more answers
Consider an improved version of the Vigen ere cipher, where instead of using multiple shift ciphers, multiple mono-alphabetic su
anzhelika [568]

Answer:

Kasiski’s method for determining 't' works for Vigenère cipher as well. The only difference is therefore in the second stage of the attack. In the second stage, one needs to build a frequency table for each of the 't' keys, and carry out an attack like on the mono-alphabetic cipher. Given a long enough plaintext, this will work successfully.

Explanation:

Kasiski method is a method of attacking polyalphabetic substitution ciphers such as Vigenère cipher. It is also called Kasiski test or Kasiski examination.

The method involve finding the length of the keyword and then dividing the message into that many simple substitution cryptograms. Frequency analysis could then be used to solve the resulting simple substitution.

6 0
3 years ago
"if you add text, delete text, or modify text on a page, word recalculates the location of automatic page breaks and adjusts the
Flura [38]

Answer:

The answer to this question is option (a).

Explanation:

In the computer, all the data will store in a file that can be text file, image file, etc. All the file store data into (binary language that is (0,1)). In Microsoft Word or any other word software, we add, delete or modify any text that stores in file.  The software adjusts text location, memory, and breaks the pages automatically.

 So the correct answer to this question is option (a).  

8 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following is NOT one of the most important elements when designing a website?
    8·2 answers
  • Describe how one device can send a bit to another device.
    9·1 answer
  • You've been asked to find the largest number in a range of numbers. Which of the following could you use to find the largest num
    8·1 answer
  • Which factor did not contribute to the increase of leisure travel in the early twentieth century in the United States?
    7·2 answers
  • In powerpoint a point is _____ of an inch in height.
    6·1 answer
  • Which statement pertaining to system reliability is FALSE? Select one: A. Having the latest version of software products can mak
    15·1 answer
  • how many bits must be flipped (i.e. changed from 0 to 1 or from 1 to 0) in order to capitalize a lowercase 'a' that’s represente
    5·1 answer
  • The image below shows an encoding for a black and white pixel image. The first two
    13·1 answer
  • Which of the following statements is TRUE of a peer-to-peer network?
    10·1 answer
  • 2. When a business practices offensive behavior, you have many options. The option with the loudest voice is
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!