1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MArishka [77]
3 years ago
5

How many devices can I sign in on with my one Brainly account?

Computers and Technology
2 answers:
viva [34]3 years ago
7 0

Answer:

Pretty much how many you want!!!!!!!

<em>L</em><em>o</em><em>v</em><em>e</em><em>,</em><em> </em><em>l</em><em>a</em><em>v</em><em>e</em><em>n</em><em>d</em><em>e</em><em>r</em><em>h</em><em>e</em><em>l</em><em>p</em><em>e</em><em>r</em>

olga55 [171]3 years ago
6 0

Answer:

as many as u feel necessary

Explanation:

You might be interested in
The purpose of a good web page design is to make it
meriva

Answer:

Hi , so your answer is that a good web page design is to make it easy to use and meaningful and able to help people .

Explanation:

Really hope i helped , have a nice day :)

5 0
3 years ago
Read 2 more answers
Which website domains are most credible?
Leokris [45]

Credible websites usually end in the domain name .org or .edu

3 0
4 years ago
Read 2 more answers
circular_prime A number is called a circular prime if all rotations of its digits form a prime. For example, the number 197 is a
Lilit [14]

Answer:

function out=circular_primes(no)

prim=primes(no);% find the all prime number till the given number

pr=0;

nos=[];

po=[];

for p=1:length(prim)

   n=prim(p); % picking up each prime no one by one

   n=num2str(n);% change into string for rotation of no

   d=length(n); % length of string

   if d>1          % take nos greater than 10 beacuase below 10 no need for rotation

       for h=1:d

           a=n(1);

           for r=1:d % for rotation right to left

               if r==d  5 % for the last element of string

                   n(d)=a;

               else

               n(r)=n(r+1); %shifting

               end

           end

           

       s=str2num(n); % string to number

       nos=[nos,s]; % store rotated elements in array

       end

       if nos(end)==no   %if given no is also a circular prime we need smaller

           break;

       end

       for gr=1:length(nos) % checking rotated nos are prime or not

           p1=isprime(nos(gr));

           po=[po,p1];    %storing logical result in array

       end

           if sum(po(:))==length(nos) %if all are prime the length and sum are must be equal

               

               pr=pr+1;

               out=pr;

           else

               out=pr;

           end

       po=[];

       nos=[];

   else  

       s=str2num(n); %numbers less than 10

       f=isprime(s);

       if f==1

           pr=pr+1;

           out=pr;

       else

           out=pr;

       end

   end

       

      end

end

Explanation:

3 0
3 years ago
Need the answer ASAP!!! I’ll mark brainliest if correct
san4es73 [151]

Answer:

update standerds

Explanation:

7 0
3 years ago
In a penetration test, the ________ team comprises testers who are given no knowledge of the infrastructure and are attacking a
just olya [345]

Answer:

TIGER TEAM

Explanation:

Penetration testing is the act of simulating an attack on an organization's resources to assess an infrastructure's true vulnerabilities. A penetration test simulates an actual attack. Penetration testers use a variety of methods including social engineering, software hacking and physical intrusion.

There are different types of penetration testing teams which are: red team, blue team and purple team.

Red team also known as the tiger team simulates real types of cyber attacks in order to discover any unknown security vulnerabilities or weaknesses.

In penetration testing, tiger (red) team are the attackers and are usually outside contractors, with a lot of knowledge of how to break in but NO KNOWLEDGE OF WHAT SECURITY IS IN PLACE.

Therefore, In a penetration test, the TIGER TEAM comprises testers who are given no knowledge of the infrastructure and are attacking a target that is unaware of their existence until the attack is made.

3 0
3 years ago
Other questions:
  • What does iSCSI stand for?
    5·2 answers
  • What Event is called when an Object collides with an non-trigger collider?
    13·1 answer
  • How do you delete text from a slide
    14·2 answers
  • The two variables causing the point of difference between the time codes are the frequency and the count
    6·1 answer
  • Scratch and grinding marks on sedimentary rocks indicate which type of environment?
    6·1 answer
  • Jackson is teaching the decimal number system. He wants his students to know how to expand numbers by powers of 10. Which is the
    13·2 answers
  • How do i do a mutioutput on a mac
    9·1 answer
  • What is the CPU's role?
    15·2 answers
  • The lower band and upper band of integer data type​
    6·1 answer
  • Why is my internet slow even though the speed test says it is fast
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!