How do you reset a g.mail password?

Answers

Answer 1

Answer:

put: forgot password to reset it

Answer 2

Answer:

Change your pass word

Open your Go ogle Account. You might need to sign in.

Under "Security," select Signing in to G oo gle.

Choose Password. You might need to sign in again.

Enter your new password, then select Change Password.


Related Questions

list the steps involved in cutting and pasting in a different document​

Answers

To cut or copy, hold down Ctrl and press X or C. Choose Paste from the menu bar when you right-click the item's destination. You can right-click almost anywhere, including inside a document or folder. To paste, hold down Ctrl and press V on the keyboard.

What are the best editing apps?

Answers

Answer:

Snapseed, Lightroom, Adobe Photoshop, Prisma, Bazaart, Photofox, VSCO and PicsArt.

Explanation:

Snapseed, Lightroom, Adobe Photoshop, Prisma, Bazaart, Photofox, VSCO and PicsArt are the best editing apps. Some of the apps are present as free while some of them are not available without paying money for it. These are the top best editing apps so you can use it anyone of it. Snapseed is free on iOS and Android whereas Lightroom needs $5 per month for full access. Adobe Photoshop is also free on iOS and Android.

Answer:

After effects or alight motion on mobile are pretty good

Explanation:

can you help me here please​

Answers

Explanation:

because Anna is a music lover she had download lots of songs.When downloading songs a virus should have gone from the websites to her computer.

to avoid this problems she should not have gone through the different websites

Identify an advantage of the software as a service (SaaS) approach in public cloud computing. Group of answer choices The user handles software maintenance and upgrading features. The user controls software deployment and configuration settings. The user can create an application using tools and libraries from the provider. The user does not need to purchase and install additional hardware to provide increased capacity.

Answers

Answer:

The user does not need to purchase and install additional hardware to provide increased capacity.

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

Cloud computing comprises of three (3) service models and these are;

1. Platform as a Service (PaaS).

2. Infrastructure as a Service (IaaS).

3. Software as a Service (SaaS).

Software as a Service (SaaS) can be defined as a cloud computing delivery model which involves the process of making licensed softwares available over the internet for end users on a subscription basis through a third-party or by centrally hosting it. Some examples of SaaS are Go-ogle apps, Bigcommerce, Salesforce, Slack, Dropbox, DocuSign, Microsoft Office 365, etc.

An advantage of the software as a service (SaaS) approach in public cloud computing is that the user do not have to purchase and install additional hardware to provide increased capacity because the software provider makes all of the necessary features for smooth operations and proper functioning available to the user.

Define the terms data and information ??​

Answers

Answer:

Data is an individual unit that contains raw materials which do not carry any specific meaning. Information is a group of data that collectively carries a logical meaning. Data doesn't depend on information. Information depends on data. It is measured in bits and bytes.

Data refers to raw unprocessed facts while information refers to data or raw facts that have undergone processing.

PLEASE I NEED HELP FAST

Answers

Answer:

your answer will be src=

i need a constant supply and i am not portable
A. desktop pc
B. smart phone
C. tablet pc
D. laptop​

Answers

the answers desktop pc

Software and technology that allow people to work together on a task are known as

Answers

Collaborative software or groupware.

Answer:

Collaborative software

You are planning a program to find the maximum heart rate recommended for patrons of a gym where you have a part-time job. One formula for calculating the maximum heart rate is the difference between 220 and the patron’s age. Some of the steps in your plan are below.

Put them in order of which occurs first. Some steps are not listed.

Answers

Answer:

Age = int(input(Enter your age? "))

print(f"Your maximum heart rate is {220 - age}.")

Explanation:

The programs will be as follows

Age = int(input(Enter your age? "))

print(f"Your maximum heart rate is {220 - age}.")

 

Answer:

got 100 on the quiz

Explanation:

What should Iris obtain from the client in order to display the work in her portfolio?

Answers

Answer:

depends on the laws of the country in which you are working

Explanation:

This is very vague and usually depends on the laws of the country in which you are working. In some cases, Iris would need permission from the client in order to display the work. In other cases, Iris would not need anything because she is the original creator of the content. This mostly depends on the laws of the country and whether or not a specific contract was created between Iris and the client, stating if the content rights where transferred or not.

write an algorithm to find perimeter of circle

Answers

Answer:

Here’s one!

Given [math]R[/math], the radius of the circle.

Let [math]N,D\leftarrow 0[/math]

Repeat until [math]D[/math] is large enough (about 1,000,000)

[math]x,y\leftarrow U[0,1][/math]

If [math]x^2 + y^2\le 1[/math] then [math]N\leftarrow N+1[/math]

[math]D\leftarrow D+1[/math]

[math]P\leftarrow\frac{8NR}{D}[/math]

Return [math]P[/math]

[math]U[0,1][/math] is a uniform random number in the range [math][0,1][/math].

Explanation:

I love science its my favorite subject

Answers

Answer:

Nice!

Explanation:

i like physics and biology :)

Answer:

I also love science!!

Explanation:

An attacker has been successfully modifying the purchase price of items purchased at a web site. The security administrators verify the web server and Oracle database have not been compromised directly. They have also verified the IDS logs and found no attacks that could have caused this.
What is the mostly likely way the attacker has been able to modify the price?
A. By using SQL injection
B. By changing hidden form values in a local copy of the web page
C. By using cross site scripting
D. There is no way the attacker could do this without directly compromising either the web server or the database

Answers

the correct answer is b

¿Cómo sobrevivirían las personas, sin gas, agua, luz, teléfono, ni internet?

Answers

Eles nao tinham Condiçoes de vida e sem a agua nao consiguem Sobreviver porque agua é tudo e a agua é metade da nossa vida

rem wap a programe using function procedure to calculate simple interest

Answers

Answer:

The program in Python is as follows:

def interest(P,R,T):

    [tex]I = P * R * T/100[/tex]

   return I

   

P = float(input("Principal: "))

R = float(input("Rate (%): "))

T = float(input("Time (years): "))

print(interest(P,R,T))

Explanation:

Required

Simple interest program using function

This defines the function

def interest(P,R,T):

This calculates the simple interest

   [tex]I = P * R * T/100[/tex]

This returns the calculated interest

   return I

The main begins here

These get inputs for principal, rate and time

P = float(input("Principal: "))

R = float(input("Rate (%): "))

T = float(input("Time (years): "))

This calls the interest function

print(interest(P,R,T))

Steeler corporation is planning to sell 100,000 units for 2.00 per unit and will break even at this level of sales fixed expenses will be 75,000 what are the company's variable expenses per unit

Answers

Answer:

1.25 per unit

Explanation:

Number of units to sell = 100,000

Price per unit = 2

Fixed expense = 75000

At break even point :

Revenue = total expenses

Total expenses = fixed cost + variable cost

Let variable cost = x

Revenue = units to sell * price per unit

Revenue = 100,000 * 2 = 200,000

Hence,

Fixed cost + variable cost = Revenue

75000 + x = 200,000

x = 200, 000 - 75000

x = 125,000

Variable cost = 125,000

The variable expense per unit is thus :

Variable expense / number of units

125,000 / 100,000 = 1.25 per unit

Are DoS and DDos tactics appropriate for legitimate organizations to use against others? What fallout is considered appropriate fallout should an attack be used on others? Explain your answer.

Answers

Answer:

They are inappropriate

fallouts: Access denial and data theft

Explanation:

Dos ( denial of service ) and DDos ( distributed denial of service ) are inappropriate for legitimate organizations to use against each other. because DOS or DDos attacks are attacks on the server of an organization by sending an unusual amount of traffic to the server, thereby denying the devices and users connected to the server access to the server.

Access denial and data theft are the fallouts associated with DOS  and DDos attacks

Write a loop that displays your name 10 times. 2. Write a loop that displays all the odd numbers from 1 through 49. 3. Write a loop that displays every fifth number from 0 through 100. 4. Write a code sample that uses a loop to write the numbers from 1 through 10 to a file. 5. Assume that a file named People.txt contains a list of names. Write a code sample that uses a while loop to

Answers

Answer:

The program in Python is as follows:

#1

for i in range(10):

   print("MrRoyal",end=" ")

print()    

#2

for i in range(1,50,2):

   print(i,end=" ")

print()

#3

for i in range(0,101,5):

   print(i,end=" ")

print()

#4

i = 1

while i <=10:

   print(i,end =" ")

   i+=1

#5

myfile = open("People.txt", "r")

eachLine = myfile.readline()

while eachLine:

   print(eachLine)

   eachLine = myfile.readline()

myfile.close()

Explanation:

The program in Python is as follows:

Program #1

This iterates from 1 to 10

for i in range(10):

This prints the name for each iteration [modify to your name]

   print("MrRoyal",end=" ")

This prints a new line

print()    

Program #2

This iterates from 1 to 49 with an increment of 2

for i in range(1,50,2):

This prints the odd numbers in the above range

   print(i,end=" ")

This prints a new line

print()

Program #3

This iterates from 0 to 100 with a step of 5

for i in range(0,101,5):

This prints every 5th number

   print(i,end=" ")

Print a new line

print()

Program #4

This initializes the number to 1

i = 1

This opens the file in an append mode

f = open("myfile.txt", "a")

This loop is repeated from 1 to 10

while i <=10:

This writes each number to the file

   f.write(str(i))

Increment the number by 1

   i+=1

Close the file

f.close()

Program #5

This opens the file in a read mode

myfile = open("People.txt", "r")

This reads each line

eachLine = myfile.readline()

This loop is repeated for every line

while eachLine:

Print the content on the line

   print(eachLine)

Read another line

   eachLine = myfile.readline()

Close the file

myfile.close()

Help me plzzzz ASAP T-T and it's Cyber Security but my last day of school is tomorrow and I'll graduate in June 24 so plzzzzz I really need correct answer ASAP

What kinds of people do you think are susceptible to being duped by "phishing" attacks?

Answers

Answer:

Find answers below.

Explanation:

Social engineering can be defined as an art of manipulating people, especially the vulnerable to divulge confidential information or performing actions that compromises their security.

Basically, it is a manipulative strategy or technique that involves the use of deceptive and malicious activities on unsuspecting victims in order to gain unauthorized access to their confidential or private information for fraud-related purposes. Some examples of social engineering attacks include quid pro quo, spear phishing, baiting, tailgating, water-holing, vishing, pretexting, phishing, etc.

Phishing is simply a form of cyber attack which typically involves making an attempt to obtain sensitive user informations such as usernames, passwords and credit card details or bank account details by disguising one's self as a trustworthy entity in an electronic communication usually over the internet.

Generally, the type of people who are susceptible to being duped by "phishing" attacks are those who post or share their email address or contact informations on public forums and don't scrutinize and examine a message before acting on it.

In conclusion, phishing is a type of fraudulent or social engineering attack used to lure unsuspecting individuals to click on a link that looks like that of a genuine website and then taken to a fraudulent web site which asks for personal information.

Answer:

what do you look like?

(101101+10110) /110
101101-11001/101 please I need help

Answers

Answer:

000000000000000000000000000001111111111111111111

suggest a reason why it was constructed there?​

Answers

Can you post the work assigned so I can better understand?

MAN on metropolitan area network is a network spanning a large distances of a few kilometre like a city true or false​

Answers

Answer:

True

Explanation:

It is True

Two uses of mortise chisel

Answers

Answer:

Two uses of the mortise chisel are;

1) Mortise chisel are used for cutting across the grain of the wood directly   and also

2) To lever waste materials out of the cut area and smoothen the cut area

Explanation:

A mortice is a recessed hole created in a part that is meant to accommodate a complementary projection part, which will enable the fastening of the two parts together

A mortise chisel are chisels used for the chopping out mortise joints, and are designed such that the heavy impact of a mallet

In cell K2 enter a formula using the IF and OR functions, as well as structured references, to determine if Adam Moriarty can be a group leader. a. The IF function should first determine if the staff member’s Service Years is greater than 3 OR if the staff member’s college graduate status is "Yes". Remember to use a structured reference to the Service Years and the College Graduate columns.

Answers

Solution :

The value of the K2 cell is filled by IF and OR functions with structured references as :

[tex]K2=IF(OR([CBF\ \text{Staff[ Service years]} > 3, \text{CBF Staff[College graduate]}="Yes"),"Yes","No")[/tex]

Now if the syntax of the formula is not provided, then we can use :

[tex]$K2=IF(OR([[\text{Service Years}]]>3,[[\text{College Graduate}]]="Yes"),"Yes","No")$[/tex]

The staff member are required to satisfy one of the two or both the conditions so as to become a group leader. The conditions are :

---   staff member should served for more than 3 years

--- staff members should be college graduate

four categories of installer apps

Answers

Answer:

I find 5 categories

Explanation:

1 Overview

2 Necessity

3 Types

4 Attended installation

4.1 Silent installation

4.2 Unattended installation

4.3 Headless installation

4.4 Scheduled or automated installation

4.5 Clean installation

4.6 Network installation

5 Installer

5.1 Bootstrapper

5.2 Common types

5.3 System installer

E) ¿Entiende usted que tendría repercusión legal un mal manejo de los datos del cliente por parte de la empresa? ¿Por qué?

Answers

Answer:

Efectivamente, un mal manejo de los datos del cliente por parte de la empresa tendría repercusiones legales que afectarían negativamente a la compañía. Esto es así porque un eventual mal manejo de los datos personales de los clientes implicaría una filtración de dichos datos hacia el resto del público, con lo cual los datos personales y privados de cada cliente se verían expuestos en forma pública, generando así posibles daños a estos a través de la mala utilización de dicha información por parte de terceros malintencionados.

A sum of money is shared between 2 friends in the ratio 2 : 3. If the larger

share is $450. What is the total sum shared?

Answers

300! Is the answer for this problem. 450 is the bigger sum, and that’s the 3 part of the ratio. So when we divide 450 by 3 it gives us 150. 150 is what one point on the ratio stands for. We’re looking for what 2 points on the ratio is, so 150*2 which gives us 300 … hope this helps

Each time David saves a file, he saves it to the desktop of the computer. His desktop is very cluttered and he has trouble finding the files that he needs. Advise David on a more effective way to organize his files​

Answers

Answer:

well she should organise his desktop a-z so that way he can just look at the name of the file he needs or give the files easier names to remember that way whatever file he needs he can just click on it

Explanation:

David could organise them in alphabetical order or he could delete all the files he no longer needs. He could also sort them into different folders depending on the type of software he uses for each file.

this bar is located at the top of your computer school in.Its functions allow you to navigate the web​

Answers

Answer:

idu

Explanation:

The answer is Address bar

PLEASE READ ( if you want ) Before i used to have over 30 brainliest and i was just trying to earn points so i could get to ace, and people went through my profile and reported a ton of the things i answered so all of them got deleted. Now i only have 8 brainliest and i need 15. What am i supposed to do? It's causing me to lose points and brainliest. Ive lost 22 BRAINLIEST. its so annoying D: what do i do

Answers

Answer:

Rip! Do you have any idea why they're doing it? Are there things wrong with your answers or are people purposefully targeting you? And if so have you tried reaching out to staff?

Other Questions
A researcher assesses the length of prison sentence assigned to a physically attractive or unattractive defendant. The researcher believes that attractive defendants will be assigned shorter prison sentences than unattractive defendants. The research hypothesis would be Group of answer choices some other variable such as gender is responsible for difference in assigned length of prison sentence. physically attractive defendants will receive shorter prison sentences than physically unattractive defendants. physically attractive defendants will receive longer prison sentences than physically unattractive defendants. there is no difference in length of prison sentence received by attractive versus unattractive defendants. For EASY BRAINLIEST!!! Answer:A.B.C.D. On both questions Can metals have covalent radius and van der Waal's radius instead of metallic radius? Evaluate 13 - 0.75w+8x when w=12 and x= 1 over 2 Prepare a collage of tools and equipment used in production of any one agricultural crop, from seed or planting through packaging of the produce There is a bag filled with 3 blue and 4 red marbles. A marble is taken at random from the bag, the colour is noted and then it is replaced. Another marble is taken at random. What is the probability of getting exactly 1 blue? Which of the details support the central idea that ancient Egyptian culture was responsible for many advances today? (also because I'm impatient and my laptop is dying I will give you 50 points if you give me the right answer ) Q.No.1: A subset of {1,7,8 } is: In LMN, MN = 15, NL = 20, and LM = 6. Which list has the angles of LMN in order from smallest to largest? Which equation is a function of x? What happens if the first line of defence is breached? (Will mark as brainliest) which linear inequality is represented by the graph Someone Helppp me please Place the following in increasing atomic radius:Least to most Find RS. See image below African tribal rhythms and musical traditions survived the shock of the transportation of millions of Africans as slaves tothe Americas, and after 300 years of slavery in the so called Land of the Free the sounds of Old Africa became thenew sounds of black America,aRead the passage above. What does it try to persuade the reader?African tribal rhythms don't sound goodAfrican Americans are still treated like slavesSlavery is badd. African Americans finally found freedom through musicbC pls answer. its urgent plsan if B is completely insoluble in water. Your description should include the volume of solvent required.6b) Assuming that 2 mg of the impurity B are present along with 100 mg of A, describe how you can purify A if B has the same solubility behavior as A. Will one crystallization produce pure A what is 1+1+3+4+6+2+6+3+5=+8+2+5 Does understanding Earths place in the universe and the relationships of different objects in the solar system help people plan for the future of our planet?