1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ierofanga [76]
3 years ago
7

Is there a way to earn free robux

Computers and Technology
2 answers:
worty [1.4K]3 years ago
8 0

Answer:

not really

explanation:

there isnt a way to get it for free alone. if a friend has robux, they can give/trade you

zloy xaker [14]3 years ago
8 0

Answer:

Yes!

Explanation:

You will get it free by having someone else buy it for you!

You might be interested in
A cookie is stored on your device's memory or disk in what file format? 1.)video file
Natalka [10]

Answer:

text file format

4 this is the answer

4 0
2 years ago
If a computer reboots itself on its own the computer might have a(n)
MissTica

Answer:

D. Software Problem

Explanation:

It could be that the software is bootlooping which will power on and off until its fixed.

4 0
3 years ago
Find the number of ways in which a committee of 4 can be chosen from six boys and
natima [27]

Answer:

465 ways

Explanation:

Atleast 1 girl and 1 boy

Possible combinations :

1 girl ; 3 boys = 6C1 ; 6C3

2 girls ; 2 boys = 6C2 ; 6C2

3 girls ; 1 boy = 6C3 ; 6C1

(6C1 * 6C3) + (6C2 * 6C2) + (6C3 * 6C1)

Combination formula:

nCr = n! ÷ (n-r)!r!

We can also use a calculator :

6C1 = 6

6C3 = 20

6C2 = 15

Hence,

(6C1 * 6C3) + (6C2 * 6C2) + (6C3 * 6C1)

(6 * 20) + (15 * 15) + (20 * 6)

120 + 225 + 120

= 465 ways

6 0
3 years ago
3. How can you correct the color of your photos automatically?​
natita [175]

Answer:

use the lightroom

download the app haha

4 0
3 years ago
Read 2 more answers
In which encryption strategy is the plaintext encrypted one character at a time and each encrypted character depends on that sin
Natasha_Volkova [10]

Answer:

Caesar cipher

Explanation:

In formation technology, cryptography or cryptology is a process of coding or encrypting information, using algorithms and input values in a network, where there is a present of a third party called adversaries or attackers.

There are different types of cryptography, namely, symmetric, assymmetric and hash cryptography.

Ciphers are algorithms used in cryptography to encode (encrypt) or decode (decrypt) information. An example of cipher is the Ceasar's cipher.

Ceasar cipher is a simple type of substitution cipher that encrpts plain text one character at a time and each coded character depends on the single character and a fixed distance value.

4 0
3 years ago
Other questions:
  • You have been doing a lot of web surfing lately as part of your research for your course and along the way you have noticed a gr
    14·1 answer
  • What technique is used to separate the different cell parts?
    15·1 answer
  • When the minnesota timberwolves encouraged facebook fans to post a great shot of a dunk onto its pinterest page for a chance to
    6·1 answer
  • An enterprise system is a packaged software application that helps integrate various ___________ in a company.
    15·2 answers
  • While you are working on your computer, it shuts down unexpectedly, and you detect a burning smell. When you remove the case cov
    9·1 answer
  • What is word processors​
    8·1 answer
  • Write a function called has_duplicates that takes a string parameter and returns True if the string has any repeated characters.
    7·1 answer
  • Check My Work Sherri is considering replacing a processor on her laptop. The laptop is running slower than she would like. What
    9·1 answer
  • What is the answer ??​
    5·2 answers
  • Which tool in Access will give you a detailed report showing the most accurate and complete picture of
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!