1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bogdan [553]
3 years ago
12

How do I change my username/display name

Computers and Technology
2 answers:
exis [7]3 years ago
6 0

Answer:

.

Explanation:

you do to me on the bottom bar and once you hit that you click the pencil and change it

saw5 [17]3 years ago
6 0
U can’t it is set as that when u create your profile
You might be interested in
When a file is transferred between two computers, two acknowledgment strategies are possible. In the first one, the file is chop
ExtremeBDS [4]

Answer:

Client server system, packets in the network and the discussion regarding two approaches have been done. See the attached pictures.

Explanation:

See attached pictures for explanation.

4 0
3 years ago
Do applications need to exchange udp control messages before exchanging data
Molodets [167]

The answer is NO.

Thats what makes UDP connectionless. Aclient that is going to send a UDP message to the server just sends it.The server does not know it is coming untill it arrives .When a server recieves a UDP message it gets the source address/port and the data.

7 0
4 years ago
How can anger cause workplace accidents?
Umnica [9.8K]
I think the corect answer is c
8 0
3 years ago
Read 2 more answers
Hich is an aspect of spatial-level design?
Tresset [83]

The answer is perspective, because you need a point of view (perspective) in order to make a design, a great design/

4 0
4 years ago
Read 2 more answers
An “evil twin” in the context of computer security is: a) A virus-laden attachment that looks just like a sincere attachment b)
aleksandr82 [10.1K]

Answer:

A

Explanation:

3 0
3 years ago
Other questions:
  • Sahil is making a graphic novel in which the villain plans to reduce the rate at which energy is released from the Sun. The vill
    7·2 answers
  • Before sharing a document, you must first save the document to
    12·1 answer
  • Which type of security threat installs to a computer without the user's knowledge and then monitors all computer activity?
    12·2 answers
  • Rob Janoff believes that technology should not be used too
    11·1 answer
  • You would like to know how many cells contain data. Which function should you use?
    11·1 answer
  • Write a program that takes the radius of a sphere (a floating-point number) as input and then outputs the sphere’s: Diameter (2
    7·1 answer
  • A researcher develops a new instrument to measure coping skills and conducts a pilot study to compare the new tool with an exist
    5·1 answer
  • Describe a situation in which a robot may have to avoid an obstacle without coming to a complete stop before turning.
    10·2 answers
  • Inserting and deleting text is a basic editing task in word processing.<br><br> True or false
    6·2 answers
  • How do we explain the difference between fake news and facts​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!