1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fynjy0 [20]
3 years ago
7

how many of yall got your acc hacked. i did my new acc is pxchyglow. my old one was SunShinne2006 - - quick question. lets says

your friend was in ur acc to give u robux and u changed the passowrd to something simple so they dont know ur old one, and when they give u the robux they log out then u reset then u try to log in but its like the password changed, and it hit forgot password and u use ur phone and it says it sent u a code but i didnt and then u use ur email and it says something like it sent instructions to the emai that u put and u look and their is no email. then u ask ur friend if they logged out and they say no like 3+ x and your outfits changed like everyday. and they still claim their are noT IN UR acc but next thing you know they were in ur acc or maybe they wernt and they were telling the truth. but how does your acc have your outfits change every day then... _ _ hope you enjoyed that i need an answer :'c
Computers and Technology
2 answers:
tatyana61 [14]3 years ago
8 0

Answer: I'm so sorry for your loss.

Explanation:

rodikova [14]3 years ago
3 0
I didn’t get my acc hacked, I joined Brainly a few months ago and no problem. I hope this doesn’t happen to you
You might be interested in
A method signature for a method consists of all elements of the method except the body. That is, a method signature consists of
Bess [88]
To be honest I feel like it’s B that’s looks and seems the most correct to me
8 0
2 years ago
What are four differences between tablets and smartphones?
Oksi-84 [34.3K]

Answer:

1. tablets are less portable than smartphones

2. smartphones are considered necessities and tablets are considered luxuries

3. smartphones are personal devices; tablets are usually shared

4. Tablets have larger screens for more extensive use of applications as opposed to the smaller, less versatile mobile phone screens.

8 0
3 years ago
Read 2 more answers
What kind of memory modules include registers between the system’s memory controller and the module’s memory chips, registers th
Nookie1986 [14]

Answer: Buffered

Explanation: Buffered memory is the memory contains registers between the modules of dynamic random access memory(DRAM).It is also known as registered memory. The purpose of using buffered memory to increase the stability and decrease the electrical load.

Other options are incorrect because ECC(error correcting code)memory is for correction and detection of incorrect data, non- parity memory is that don't utilize ECC module and multi-channel used for the increment in the rate of transmission between memory controller and DRAM.

Thus,the correct option is option buffered memory because of serial communication pattern with memory controller and parallel communication technique with chips .

4 0
3 years ago
Read 2 more answers
Which of the following statements are true?
grin007 [14]

Answer:

I think the answer are two which are B and C

7 0
3 years ago
In a "block" containment strategy, in which the attacker's path into the environment is disrupted, you should use the most preci
Slav-nsk [51]
The containment strategy prevents intruders from removing information assets from the network, and prevents attackers from using the organization's network as a launch point for subsequent attacks.
In a "block" containment strategy, in which the attacker's path into the environment is disrupted, you should use the most precise strategy possible, starting with <span>blocking a specific IP address. Correct answer: C

</span>

8 0
3 years ago
Other questions:
  • Henry uploaded the photos of his birthday to a cloud storage system. He feels that it’s a safe option for data storage. His frie
    12·1 answer
  • A network administrator is implementing dhcpv6 for the company. the administrator configures a router to send ra messages with m
    6·1 answer
  • Write a program that displays the following pattern: ..\.\* .\.\*** \.\***** ******* \.\***** .\.\*** ..\.\* That is, seven line
    8·1 answer
  • Internally, computers are constructed from circuitry that consists of small on/off switches. What is the most basic circuitry-le
    12·1 answer
  • High productivity will typically get you positive attention and feedback when you are on a job.
    7·1 answer
  • Throughout the course we have covered a lot of topics in relation to information systems. Select one or two of the major topics
    14·1 answer
  • Which famous individuals was born on october 31st?
    7·1 answer
  • Michael needs to ensure that those items that are automatically archived are still easily accessible within Outlook. Which optio
    5·2 answers
  • In the 1760s and early 1770s, the British government wanted to raise money by taxing the residents of its colonies in North Amer
    8·1 answer
  • If “A” represents in binary 10011001, what will be the value of word “CAB”?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!