1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NikAS [45]
4 years ago
12

Do you think I could create a working animatronic like the one from five nights at freddys

Computers and Technology
2 answers:
marishachu [46]4 years ago
6 0

Answer:

Yes

Explanation:

You probley can just depends if you have the parts.

artcher [175]4 years ago
5 0

Answer: yes

Explanation:

You can do anything if you believe you can :)

You might be interested in
Bob received a message from Alice which she signed using a digital signature. Which key does Bob use to verify the signature?Gro
alexira [117]

Answer:

Alice's public key

Explanation:A Public key is a key that can be used for verifying digital signatures generated using a corresponding private key which must have been sent to the user by the owner of the digital signature.

Public keys are made available to everyone required and they made up of long random numbers.

A digital signature signed with a person's private key can only be verified using the person's private key.

7 0
4 years ago
Routers do not forward broadcast packets.A. TrueB. False
mestny [16]
The answer you’re looking for is false
5 0
3 years ago
In Linux, when logged in as a normal user with root privileges, which command must precede the apt-get command in the command li
siniylev [52]

Answer:

"sudo" is the command to get super user or root privileges in linux.

Explanation:

in order to install package with root privilege in linux, the command would be

sudo apt-get install <package name>

8 0
3 years ago
A measure of the twisting or rotational force that an engine can produce is called
Snowcat [4.5K]
The correct answer is torque.

Torque
A twisting force that tends to cause rotation, commonly used term among mechanics and engineers.
7 0
3 years ago
Signe wants to improve the security of the small business where she serves as a security manager. She determines that the busine
jek_recluse [69]

Answer:Obscurity

Explanation: Security through the obscurity is the mechanism that is used for the security purpose in an operating system by inducing the confidentiality in the internal parts of the operating system.

The functioning of the security through obscurity(STO) works by hiding the  flaws and errors related to security  of the operating system.Thus , Signe is willing to use obscurity system.

 

6 0
4 years ago
Other questions:
  • Write an original idiom that uses the word dog or dogs im in 4th
    5·2 answers
  • Why is it important to use proper line types
    13·1 answer
  • Somebody who is good at this stuff, please halp meh ;-;
    6·1 answer
  • Within a google form when looking which option do u use?
    13·1 answer
  • Cual es la definición de grouded?​
    7·1 answer
  • Write a program that first reads in the name of an input file and then reads the input file using the file.readlines() method. T
    7·1 answer
  • I need help also this counts as my second giveaway and last for today
    12·2 answers
  • How to deactivate the brainly account?​
    13·1 answer
  • Suppose that the first goal in a GP problem is to make 3 X1 + 4 X2 approximately equal to 36. Using the deviational variables d1
    15·1 answer
  • How do you put text in MS publisher?<br><br> When do you use text wrapping?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!