1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
adoni [48]
3 years ago
14

Will you play surviv.io with me and join my team right now please because I need some friends

Computers and Technology
2 answers:
igomit [66]3 years ago
6 0

Answer:

lets play dude!!

Explanation:

Sergeu [11.5K]3 years ago
5 0

Answer:

i play

Explanation:

when will we play

You might be interested in
Cd-roms typically use the _______ filesystem type.
marissa [1.9K]
CD-<span>ROMs typically use the ____ filesystem type</span>
8 0
3 years ago
Which of the following describes creative work that can be used without permission because it is owned by the public and not an
Veseljchak [2.6K]

Answer:

C) public domain

Explanation:

Public domain is when something can use it without any restriction, these domains can be used in Photographs, videos, music, etc.

These files are public because the author has decided, we can use these files in our project without pay nothing and give any reference about the author, is not necessary but you can do it, sometimes you can donate to the author.

6 0
3 years ago
According to Ernest Hilgard, hypnosis is the result of __________.
goldfiish [28.3K]
The effects of a hidden observer
4 0
3 years ago
Read 2 more answers
A competitor goes to your public website and discovers that they can get into a directory that you did not know could be reached
Ivan

Answer:

Yes, directory traversal attack.

Explanation:

A website is a collection big web pages hosted on a web server. It contains contents like links and sometimes directory root paths. This a vulnerability attacks an exploit to access the information in a database.

There are two access to a database. One is the authentication process issued for authorised user access and the other is the root access only accessible to the network administrator. It contains paths to directories in the servers.

A directory traversal attack or path attack is done through a web browser by an attacker, who seeks for a weak path link on the public's website and accesses the information in the server.

5 0
3 years ago
Define las 3 fases de la economia y explica en que espacios se localizan​
navik [9.2K]
Can you like translate it to English so I can understand lol
7 0
3 years ago
Other questions:
  • A(n) ___ operating system is a very fast, relatively small os. it is designed to respond to hardware and program requests almost
    6·1 answer
  • You are trying to appreciate how important the principle of locality is in justifying the use of a cache memory, so you experime
    11·1 answer
  • Mica's creating his web page with a software that is free of charge for the first month. If he likes the program, he will have t
    8·2 answers
  • Susie works for an architectural firm and the partners have always drawn the plans for projects by hand. Though Susie learned ho
    8·1 answer
  • Piecewise functions are sometimes useful when the relationship between a dependent and an independent variable cannot be adequat
    12·1 answer
  • Subscript numbering always starts at what value?
    14·1 answer
  • Which of the following are examples of IT
    14·1 answer
  • In computer science, what does the word security mean?
    15·1 answer
  • Explain the correct ways of using keyboard. .​
    14·1 answer
  • Allison is preparing to modify a network access control list and add three firewall rules to her private cloud HR systems. She i
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!