1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aleksandrvk [35]
3 years ago
6

Anyone have Minecraft dungeons I need help with it

Computers and Technology
2 answers:
ella [17]3 years ago
7 0

Answer:

Yes, What do you need?

Explanation:

pls pls mark me braniliest My other account got deleted and I was one of the highest ranks.

steposvetlana [31]3 years ago
5 0

Answer:

for sure add me upppp its mypplong

You might be interested in
what new technology led to the chaos that spurred the establishment of the federal communications commission?
adelina 88 [10]

Answer:

The digital read Harry quaant

3 0
1 year ago
What is the benefit of using pre-programmed functions to analyze data?"
Murrr4er [49]

Answer:

A pre-programmed function is a section of code which is reusable to perform certain routine. One benefit of using a pre-programmed function to analyze data is the code redundancy can be reduced. The function is only written for once and it can be called to perform a specific data analysis whenever it is needed.

Besides, a pre-programmed function also offer consistent analytical output as all data are processed by a same analytical procedure in the function.  

5 0
2 years ago
A support technician uses the ping utility on a system that is online, yet no response is received. What should be allowed throu
alexgriva [62]

Answer:

Internet Control Message Protocol (ICMP) Echo Requests

Explanation:

A system that has Windows Firewall or antivirus or other third party antivirus enabled with their configuration setting set to default, ping command from another device will not be able to see if the device with an enabled firewall is alive.

The ping command sends Internet Control Message Protocol (ICMP) Echo Request to a destination device after the destination device will reply with a Reply packet. However, by default, firewalls, such as Windows firewall blocks ICMP Echo Requests from the external network and pinging will  work when the firewall is disabled or an exception is created that lets ICMP Echo Requests pass through the firewall.

4 0
3 years ago
Mason is part of a project team that is creating a television advertisement. List one risk the team faces and a strategy for min
Andru [333]

One risk might be that they might use copyright music and and the music creator might take legal action.

5 0
3 years ago
Convert to binary 140
Ber [7]

00110001 00110100 00110000

5 0
3 years ago
Other questions:
  • A customer in a store is purchasing five items. Design a program that asks for the price of each item, and then displays the sub
    11·1 answer
  • One main advantage of CD-ROMs is that..
    7·1 answer
  • 1. Grade data is:
    5·1 answer
  • : how can you reduce file size so that files can be sent more efficiently across the internet
    5·1 answer
  • True / False
    5·1 answer
  • Robin ensures that she is always available if anyone in the team needs her. Which quality is shown by robin?
    9·2 answers
  • Write a (one) program for your microcontroller so that it:
    14·1 answer
  • As Alexa types a message, Outlook autosaves the message at various points. In which folder is the message located if Alexa wants
    15·2 answers
  • What is the name for the size and style of text?
    8·2 answers
  • Bryan's company is new and has limited funds to work with. He has been tasked with finding a telecommunications technology that
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!