1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nat2105 [25]
3 years ago
9

Who plays Roblox and wants to be friends on it

Computers and Technology
shadow Rain
2 years ago
I play Roblox, account: chemical421
2 answers:
qaws [65]3 years ago
4 0
I have roblox and I would like to be friends on it
valentina_108 [34]3 years ago
3 0

Answer:

I have a Roblox account but I don't play.

Explanation:

quite useless answer so sorry

You might be interested in
Can an engine run on air? I think it can, but I am not sure
Svetlanka [38]

Hello,

NO, and engine can run on steam, gas and other things but not air.

-Bella

3 0
3 years ago
Read 2 more answers
A hacker successfully modified the sale price of items purchased through your company's web site. During the investigation that
Korvikt [17]

Answer:

By modifying the hidden form values that is in a local copy of the company web page

Explanation:

In a situation were the hacker successful change the price of the items he/she purchased through the web site of the company's in which the company web server as well as the company Oracle database were not compromised directly which means that the most likely method in which the attacker used to modified the sale price of the items he/she purchased was by modifying the HIDDEN FORM VALUE that was in the local copy of the company web page making it easy for the HIDDEN FORM VALUE to be vulnerable to the hacker because the hidden form value did not store the company server side information or data but only store the company software state information which is why HIDDEN FORM VALUE should not be trusted.

5 0
3 years ago
What methods do phishing and spoofing scammers use?
Misha Larkins [42]

Answer:

please give me brainlist and follow

Explanation:

There are various phishing techniques used by attackers:

Installing a Trojan via a malicious email attachment or ad which will allow the intruder to exploit loopholes and obtain sensitive information. Spoofing the sender address in an email to appear as a reputable source and request sensitive information

4 0
3 years ago
The major difference between a calculator and a computer, when performing calculations, is that a
bulgar [2K]
The difference between a calculator and a computer is that when a calculator performs computations it is slower but needs more human assistance - C.

While a computer on the other hand, computes tens of thousands of computations without any human input, all done automatically. 
3 0
3 years ago
Moore's Law states that the number of transistors on an integrated circuit? increases by 20% every year
qaws [65]
Doubles every two years
3 0
3 years ago
Other questions:
  • The device that links computers via communication lines is called the:
    15·1 answer
  • How do I make Dank memes
    13·2 answers
  • Why is it important to save a print copy of electronic sources
    5·1 answer
  • Norman Bates has a very unusual hobby what is it?
    13·1 answer
  • Each time you save a document, _____. you will need to type in the file type in which it should be saved you can select the Save
    11·1 answer
  • Define Indentation
    8·1 answer
  • Which of the following best describes professional behavior in the IT field?
    11·2 answers
  • Will this solution really fix the problem?
    6·1 answer
  • Match the following pls help
    5·1 answer
  • Explain the role of computers in accounting
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!