1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ivolga24 [154]
3 years ago
10

What your roblox user >:)​

Computers and Technology
2 answers:
sweet-ann [11.9K]3 years ago
5 0

Answer:

whats yours?

Explanation:

Anastasy [175]3 years ago
3 0

Answer:

i dont play roblox anymore i got hacked anyways

Explanation:

You might be interested in
Name the technique used to separate the mixture of colours in black ink ​
Nitella [24]

Answer:

chromatography

hope it helps

6 0
3 years ago
Read 2 more answers
Please answer in Java
ra1l [238]

Answer:

Scanner keyboard = new Scanner(System.in);

   

       

       

        double discount = 0;

        double productPrice;

        double subTotal;

        double salesTax;

        double saleTotal;

       

       

       System.out.printf("Enter the purchase amount:");

       productPrice = keyboard.nextDouble();

       

       if (productPrice > 10) {

          discount = 10;

}

       System.out.println( + discount + "% discount applied.");

       

       subTotal = (productPrice);

       salesTax = (subTotal * 0.14);

       saleTotal = (subTotal + salesTax - discount );

       System.out.printf("Subtotal: $%5.2f\n", subTotal);

       System.out.printf("Discount; -$%5.2f\n", productPrice - discount);

       System.out.printf("HST: $%5.2f\n", salesTax);

       System.out.printf("Total: $%5.2f\n", saleTotal + salesTax);

}

}

Explanation:

8 0
3 years ago
Oskar has been receiving emails about critical threat intelligence information from a public information sharing center. His tea
zlopas [31]

The technology that Oskar is going to recommend for the automated process would be the automated indicator sharing.

<h3>What is the automated indicator sharing?</h3>

This is a cyber security and also an infrastructure security operations that helps to show cyber threat indicators in real time.

They help to prevent cyber attacks and also put in the measures that can protect the members of the community.

Read more on the automated processes here: brainly.com/question/25707319

4 0
2 years ago
What is the uihuygyh
frez [133]
Huyghe Brewery (Dutch: Brouwerij Huyghe) is a brewery founded in 1906 by Leon Huyghe in city of Melle in East Flanders, Belgium. Its "flagship" beer is Delirium Tremens, a golden ale.
8 0
3 years ago
This is just a question but how do y'all feel about Tony and Ondreaz Lopez?
JulijaS [17]

Answer:

I don't like them, so uh nothing lol

5 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following is not an acceptable way to code a nested structure? Select one: a. nest a for loop inside a while loop b
    15·1 answer
  • Do all websites use the same coding to create?
    12·1 answer
  • Answer all of the questions correctly and you will be amazing. Fill in Blanks
    8·1 answer
  • Plz help! 3 questions! 1.The ideal light to use is.... A.front light B.a combination of side and back light C.a combination of f
    10·1 answer
  • What is the best application to keep track of inventory for a store?
    6·1 answer
  • An option button is<br>​
    14·2 answers
  • What is the area on a machine where work is actually being performed and
    12·1 answer
  • How to unblock a website on a school computer? ASAP who's ever works will get Brainliest and will get a follow.
    14·2 answers
  • List 5 uses of computer​
    9·1 answer
  • 11.5 Code Practice edhesive
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!