1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dmitriy555 [2]
3 years ago
12

How can i fix this, if i log in my acc it keeps saying wrong nickname or pass. even though my email and pass is correct

Computers and Technology
1 answer:
Oksanka [162]3 years ago
8 0

Answer:

미안해요. 나는 우리가 단지 부동일 중 하나를 모르지만 그것을 해결하는 방법을 모른다!.

You might be interested in
explain in detail how such a company can improve the focus and relationship with customers, and what they will benefit from this
Reil [10]
Advertisement maybe
6 0
3 years ago
State three reasons why users attach speakers to their computer​
____ [38]

Answer:

For listening sake

To listen to information from the computer

They receive audio input from the computer's sound card and produce audio output in the form of sound waves.

8 0
3 years ago
Please name the OOP term that allows children classes to have methods with the same names as methods in their parents.
RSB [31]

Answer:

Inheritance

Explanation:

3 0
3 years ago
The U.S. National Institute of Standards and Technology defines the incident response life cycle as having four main processes:
GuDViN [60]

Answer:

C. Post-incident activity.

Explanation:

An incident is a event of intrusion or attack or violation of an attempt of an attack. An incident response is an opposing response to an attack or violation.

An incident response life cycle are stages followed to mitigate a current attack or violation. The stages of the incident response life cycle are, preparation, detection and analysis, containing and eradicating and recovery, and post incident activity.

7 0
4 years ago
Which method is the quickest for removing multiple different indent types applied to a paragraph
White raven [17]

Are there answer choices???? I think the answer would be remove them by using the delete button

5 0
3 years ago
Read 2 more answers
Other questions:
  • The Active Directory Users and Computers tool can be used to:______.
    11·1 answer
  • Which of the following is a correct definition of the term rectification? A. Rectification is the opposition to current flow in
    14·2 answers
  • An unwanted program that can spread itself to other computers is called what?
    15·2 answers
  • Given the following class import java.util.ArrayList; public class RectangleTester { public static void main(String[ ] args) { A
    7·1 answer
  • When the Squirrel peer-to-peer web caching service was evaluated by simulation, 4.11 hops were required on average to route a re
    11·1 answer
  • What does ' array ' mean in the context of graphics programming ?
    12·1 answer
  • What are ip addresses? why are these important for forensic scientists?
    5·1 answer
  • What are the three control statements in Qbasic?​
    10·1 answer
  • A good machine should have the mechanical advantage of......?​
    7·1 answer
  • In what real-life situations might you want to use the modulus operation in a program?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!