1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Whitepunk [10]
3 years ago
10

If you were any type of fnaf charater who would you be and why?

Computers and Technology
2 answers:
Lemur [1.5K]3 years ago
4 0

Answer:

Explanation:

I’d be bts bangtan sonyeondan

Contact [7]3 years ago
3 0

Answer:

Foxy

Explanation:

Cause he's cool and he's my favorite.

You might be interested in
What command is used to request the name and address information from a dns server?
topjm [15]
Nslookup is deprecated in favor of dig
7 0
4 years ago
What are the two features of EDIAC ?​
Sergio [31]

Answer:

By the numbers: “The ENIAC contained 17,468 vacuum tubes, along with 70,000 resistors, 10,000 capacitors, 1,500 relays, 6,000 manual switches and 5 million soldered joints. It covered 1,800 square feet (167 square meters) of floor space, weighed 30 tons, consumed 160 kilowatts of electrical power.” More info

3 0
3 years ago
Andrew is researching a new operating system for the computers at his workplace. His boss wants the computers to be able to conn
Bumek [7]

Answer:

Windows 8.1 Core

Explanation:

In this particular example, we're going to use Windows 8.1 Core, is the most basic of the window's family, in this case, only we need an OS to connect the hardware with the cloud computing for security and is not necessary another license, in addition, Windows 8.1 core is easiest to use, is so friendly with the user.

6 0
3 years ago
Occurs when the same data are stored in multiple places
Minchanka [31]
D. Data redundancy. This means the data is located in multiple places when it isn't necessary to do so.
8 0
3 years ago
0010 0000<br> What is the binary decimal
Degger [83]

Answer:

The decimal number is 32 and the Hexidecimal  is 20

5 0
3 years ago
Read 2 more answers
Other questions:
  • Rebecca completed work on a computer and is verifying the functionality of the system when she finds a new problem. This problem
    13·1 answer
  • The purpose of the ________ element is used to configure the main content of a web page document.
    5·1 answer
  • An organization's contact information includes its _____.
    9·2 answers
  • could someone plz enplane to me what iOS r because i go to donlaod a app on my phone and it says i need to upgrade to a iOS 8.0
    14·2 answers
  • An employee’s total weekly pay equals the hourly wage multiplied by the total number of regular hours plus any overtime pay. Ove
    13·1 answer
  • Which of the following examples has four beats in each measure?
    12·2 answers
  • You have just replaced the motherboard in your computer. now your computer will not start. you press the power button on the sys
    6·1 answer
  • Convert 4.5 strides to girth
    10·1 answer
  • Although architects frequently do most of their work in an office, what might motivate an architect to work from the jobsite?
    7·1 answer
  • Which of the following activities is not permissible for IT professionals while on the job? Check all of the boxes that apply.
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!