1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
riadik2000 [5.3K]
3 years ago
11

Why don't I have friends?

Computers and Technology
2 answers:
Papessa [141]3 years ago
7 0

Answer:

maybe you do not ask for them i will be your friend.

Explanation:

Alik [6]3 years ago
5 0

Answer:

maybe you need to speak up

You might be interested in
I need help ASAP Asap asap!!!
timama [110]

Tbh this is a very poor question, mainly because it just assumes you play games at all.


Not only that, but it's really an opinion based question, unless they defined "poor game design puzzles" for you to work with.


Anywho, Just talk about how Breath of The Wild had poor temple design(Too easy) and talk about how you would make the temples larger and not a tiny "divine beast"(actually large in size, but small for a temple). Hope this helps I guess. Lol

8 0
3 years ago
Why did the creation of ARPANET help with this critical need?
charle [14.2K]
<span>Scientists needed a way to work together to share their research and findings. Especially after a nuclear exchange.</span>
8 0
3 years ago
These can be nodes in a computer network
Hunter-Best [27]

Answer:

Computers

Explanation:

Node is an electronic device. It is the Physical components that can send, receive or forward data.

Computer is an electronics devices and also have ability to send, receive or forward data. so this is the reason that, we can say computer is a node in computer network.

6 0
3 years ago
A reflective cross-site scripting attack (like the one in this lab) is a __________ attack in which all input shows output on th
Murrr4er [49]

Answer:

" Non-persistent" is the right response.

Explanation:

  • A cross-site category of screenplay whereby harmful material would have to include a transaction to have been transmitted to that same web application or user's device is a Non-persistent attack.
  • Developers can upload profiles with publicly available information via social media platforms or virtual communication or interaction.
6 0
3 years ago
How many typefaces should you use in business documents?
Assoli18 [71]
It’s best to use two
5 0
3 years ago
Read 2 more answers
Other questions:
  • True or false: Sony is the company behind the creation of the ‘Super Mario Bros.' franchise.
    8·2 answers
  • Investments in data networks, ip addresses, routers, and switches are ________ because of their impact on productivity, security
    14·1 answer
  • The ___________ command waits for windows 7 to save your work and then turns off the computer fans and hard disk. answer shut do
    11·1 answer
  • Order the following list of functions by the big-Oh notation. Group together those functions that are big θ of one another.6nlog
    5·1 answer
  • Which function will add a grade to a student's list of grades in Python? add() append() print() sort()
    5·2 answers
  • Free 100 point to first to answer
    5·2 answers
  • All NATE specialties are offered at two levels, A. journeyman and master. B. installation and service. C. apprentice and journey
    7·1 answer
  • When you open your word-processing program, it opens in a<br> field<br> menu
    9·2 answers
  • How do operating system work?
    5·1 answer
  • A penetration tester is experimenting with Network Mapper (Nmap) on a test network as a privileged user. The tester would like t
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!