1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tems11 [23]
3 years ago
12

Alright, don't judge me, this is a question that involves my Childhood game PvZ GW 2. So I noticed mods and stuff that get uploa

ded and I was curious, how can I make my own characters? I know how to do the basic things (kinda) like getting the unused Hover-Goat 3000 skin, but I wanna know how you can make custom characters/maps.
Thanks for your time, and I wouldn't be shocked if nobody could answer this question XD
Computers and Technology
2 answers:
Ann [662]3 years ago
7 0

Answer:

honnnestlyyy, you might have to y0utub3 it

ipn [44]3 years ago
4 0

I think you need a separate attachment or app. If your talking about on a console, I think you need a flash drive to move it to the game.

You might be interested in
On the home ribbon, what do you use to change the font size of characters in a cell
timofeeve [1]
The font tab in the home ribbon
7 0
4 years ago
When federal courts are evaluating digital evidence from computer-generated records, what exception is applied to hearsay?'
Sidana [21]

Answer:

Business-records exception

Explanation:

The Business-records exception which is also known as the Business Entry Rule, this is an exception to the evidentiary rule (which rules out hearsay from a trial) that permits business records to be admitted if the appropriate foundation is laid to show the document is dependable and can be relied upon.

5 0
4 years ago
hich of the following is different on the Cisco switch CLI for a Layer 2 switch as compared with the Cisco router CLI?a. The com
olasank [31]

The majority of Cisco equipment (including routers and switches) configure the network device using the CLI (Command Line Interface). The CLI is a text-based interface.

<h3>What is CLI?</h3>

The enter configuration commands and employ show commands to obtain the router's or switch's output.

The majority of the work is done on the CLI, although there are GUIs (Graphical User Interfaces) for the routers, switches, and firewalls as well.

This may sound dated, but the CLI is much simpler to use than any graphical interface because there are so many commands available. Additionally, copying entire configurations from one device to another is much simpler.

Therefore, The majority of Cisco equipment (including routers and switches) configure the network device using the CLI (Command Line Interface). The CLI is a text-based interface.

To learn more about cisco, refer to the link:

brainly.com/question/8986399

#SPJ1

8 0
1 year ago
Sheela often forgets what she needs to do throughout the day, and she misses meetings and deadlines to submit reports. Which ema
igor_vitrenko [27]

I believe this would be D. Maintaing a task list, because this would help her to see what she has schedules, what she has to submit, all the tasks that would need completed.

Hope this helps!

3 0
4 years ago
Read 2 more answers
Lesson 12: while loops with the farmer. Number 9.
Vikki [24]

Answer:

just repeat the move forward as many times until you get to the hole and fill 1

Explanation:

i think this might work

if it does can i have brainliest

3 0
3 years ago
Read 2 more answers
Other questions:
  • You have seven DNS servers that hold an Active Directory–integrated zone named csmpub.local. Three of the DNS servers are in the
    14·1 answer
  • Quien invento el primer vehiculo con motor?
    15·2 answers
  • Assume that the following variables have been defined in a program: int x = 10; int y = 20; int z = 30; Write a cout statement t
    11·1 answer
  • Consider the following relationship involving two entities, students and classes:A student can take many classes. A class can be
    9·1 answer
  • What is a statement that adds 1 to the int j when the int counter has a value less than the int n?
    12·1 answer
  • A common method of grouping security risks and security safeguards (controls) is to organize them into logical _________________
    12·1 answer
  • Assume that a single page of printed text requires 52 lines of text, and that each line of text averaged 80 characters. If each
    9·1 answer
  • Tanya wants to include an instructional video with all its controls on her office website. The dimensions of the video are as fo
    10·1 answer
  • Rewrite the following program segment using a while loop instead of a for loop.
    11·1 answer
  • We initialize the parameters to all zero values and run the linear perceptron algorithm through these points in a particular ord
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!