1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fynjy0 [20]
2 years ago
7

how many of yall got your acc hacked. i did my new acc is pxchyglow. my old one was SunShinne2006 - - quick question. lets says

your friend was in ur acc to give u robux and u changed the passowrd to something simple so they dont know ur old one, and when they give u the robux they log out then u reset then u try to log in but its like the password changed, and it hit forgot password and u use ur phone and it says it sent u a code but i didnt and then u use ur email and it says something like it sent instructions to the emai that u put and u look and their is no email. then u ask ur friend if they logged out and they say no like 3+ x and your outfits changed like everyday. and they still claim their are noT IN UR acc but next thing you know they were in ur acc or maybe they wernt and they were telling the truth. but how does your acc have your outfits change every day then... _ _ hope you enjoyed that i need an answer :'c
Computers and Technology
2 answers:
tatyana61 [14]2 years ago
8 0

Answer: I'm so sorry for your loss.

Explanation:

rodikova [14]2 years ago
3 0
I didn’t get my acc hacked, I joined Brainly a few months ago and no problem. I hope this doesn’t happen to you
You might be interested in
How do you select a single cell, a single column, a single
Vedmedyk [2.9K]

Answer:

To select nonsequential cells, click the first cell, hold down the Ctrl key, and click each additional cell (or row or column) you want to select. To selectthe entire worksheet, click the small box located to the left of column A and above row 1. Optionally, you can selectall cells in a worksheet by pressing COMMAND+A......

To select all cells on a worksheet, use one of the following methods:

Click the Select All button.Press COMMAND+A. Note If the worksheet contains data, and the active cell is above or to the right of the data, pressing COMMAND+A selects the current region. Pressing COMMAND+A a second time selects the entire worksheet.

8 0
2 years ago
An algorithm whose worst-case time complexity is bounded above by a polynomial function of its size is called a(n)
Sedaia [141]

Answer:

polynomial-bounded algorithms

Explanation:

There are two algorithm complexities and they are time and space complexities. They can be denoted with the big-O notation. The big-o notation for a time and space complexity gets the worst-case time and space respectively.

The time complexity gets the measure of the execution time of an algorithm. When the time function is a polynomial ( k^n + k^n-1 ...) then the algorithm is said to be a polynomial-bounded algorithm.

4 0
2 years ago
In what way are a coffee maker and a dishwasher the same?<br><br>BY THE WAY THIS IS TEENBIZ
weeeeeb [17]
They both need electricity. Both used in the kitchen.
3 0
2 years ago
Read 2 more answers
PLZ ANSWER WORTH 20 POINTS!! URGENT!
omeli [17]

Answer:

C. a registered Microsoft Account

8 0
3 years ago
Read 2 more answers
URGENT HELP PLEASE C+++
gtnhenbr [62]

Answer:

#include using namespace std;

cout << quotient;

Explanation:

not #include ; using namespace std;

; doesn't belong

cout << quotient

forgot the ; at the end

7 0
2 years ago
Other questions:
  • Please explain external hashing, B-trees, and traversals. 3-5 sentences per
    8·1 answer
  • . Reorder the following efficiencies from smallest to largest:
    9·1 answer
  • 3. The invention of the transistor was important to the development of computers because it
    5·1 answer
  • STEAM game launcher question.
    15·1 answer
  • Write the definition of a function named fscopy. This function can be safely passed two fstream objects, one opened for reading,
    11·1 answer
  • When backing up a database, what is added to the file name?<br> On g metrix
    9·1 answer
  • Write a method named removeRange that accepts an ArrayList of integers and two integer values min and max as parameters and remo
    10·1 answer
  • In cell K8, create a formula using the SUM function that calculates the total of range D17:D20 and subtracts it from the value i
    7·1 answer
  • Years ago when working a helpdesk, the most common question asked, almost daily, was about resetting passwords. What type of kno
    11·1 answer
  • IP ______ occurs when an intruder computer fools a network into believing its IP address is associated with a trusted source.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!