1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fynjy0 [20]
3 years ago
7

how many of yall got your acc hacked. i did my new acc is pxchyglow. my old one was SunShinne2006 - - quick question. lets says

your friend was in ur acc to give u robux and u changed the passowrd to something simple so they dont know ur old one, and when they give u the robux they log out then u reset then u try to log in but its like the password changed, and it hit forgot password and u use ur phone and it says it sent u a code but i didnt and then u use ur email and it says something like it sent instructions to the emai that u put and u look and their is no email. then u ask ur friend if they logged out and they say no like 3+ x and your outfits changed like everyday. and they still claim their are noT IN UR acc but next thing you know they were in ur acc or maybe they wernt and they were telling the truth. but how does your acc have your outfits change every day then... _ _ hope you enjoyed that i need an answer :'c
Computers and Technology
2 answers:
tatyana61 [14]3 years ago
8 0

Answer: I'm so sorry for your loss.

Explanation:

rodikova [14]3 years ago
3 0
I didn’t get my acc hacked, I joined Brainly a few months ago and no problem. I hope this doesn’t happen to you
You might be interested in
Most panoramic photography focuses on what subject?
Verizon [17]
Landscapes is the correct answer. Just google it and click images.
4 0
3 years ago
Read 2 more answers
Not everything is a success all of the time! So do you know which version of Windows was the least popular?
mario62 [17]

Answer:

windows xp

Explanation:

I think because it is not fast and don't play the games and programs which have higher requirements

7 0
3 years ago
Chang is a network engineer. He is revising the company's firewall implementation procedure. As part of this work, he is reviewi
erastovalidia [21]

Answer:

d

Explanation:

3 0
3 years ago
Which function can be used to insert the current date into a spreadsheet?
VladimirAG [237]

Answer:

im pretty sure it MM/DD/YYYY

Explanation:

3 0
3 years ago
Differentiate between symmetric and asymmetric encryption
Shalnov [3]

Answer:

While symmetric encryption uses a single shared key to encrypt and decrypt data, asymmetric uses two separate keys

8 0
1 year ago
Read 2 more answers
Other questions:
  • What is the main difference between a literacy society and a digital Society
    9·1 answer
  • What is the difference between HTML and CSS? * 1. CSS is a markup language unlike HTML. 2. HTML is a backend technology and CSS
    12·2 answers
  • When you're working with a word processing document and you press the Del key, what happens? A. The paragraph you're working on
    12·1 answer
  • An alien from planet Tao has descended onto Earth.
    12·1 answer
  • Shawn thought that the screen of the block-based program he was using was
    15·1 answer
  • What connectors are available for components to be connected externally to the motherboard
    12·2 answers
  • In an array-based implementation of a dictionary, if you represent the entries as an array of objects that encapsulate each sear
    12·1 answer
  • Agent Phil Coulson developed this program to register Avengers in S.H.I.E.L.D's database using cutting-edge programming language
    15·1 answer
  • _________________ uses soap or detergent to physically remove germs, dirt, and impurities from surfaces or objects.
    13·1 answer
  • When a ____________ file is opened, it appears full-screen, in slideshow mode, rather than in edit mode.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!