1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
True [87]
3 years ago
8

Anyone play Ps4 and wanna run up some warzone or Gta? Im M 16 so dont be a creep... :) ill mark brainliest if you drop gamertag

for PS4.
Computers and Technology
jrplumbcrazy
2 years ago
ya
2 answers:
Soloha48 [4]3 years ago
7 0

Answer:

i could run warzone but not gta i ain't got ps plus rn

Explanation:

Nikitich [7]3 years ago
4 0

Answer:

Xbox/ PC game here

Explanation:

You might be interested in
What is the title of RFC 4890 and what year was this RFC published?
Phantasy [73]

Answer:

The title of RFC 4890 is "Recommendations for Filtering ICMPv6 Messages in Firewalls" and it was published in 2007.

Explanation:

RFC 4890 is the memo that was published in 2007. This document is about the recommendations of filtering messages that are harmful and having security risk for Internet Control Message Protocol ICMP version 6.

In this document different types of risk associated ICMPv6 protocol while forwarding messages. This memo recommends filtering techniques to drop the harmful messages and make the communication secure.

4 0
3 years ago
What are some other ways to program a robot to navigate a complicated environment other than straight paths and right angle (90
In-s [12.5K]

Answer:

The most popular method of robot programming is probably the teach pendant. ... To program the robot, the operator moves it from point-to-point, using the buttons on the pendant to move it around and save each position individually. When the whole program has been learned, the robot can play back the points at full speed.

8 0
3 years ago
Read 2 more answers
A technician is troubleshooting an employee laptop that has a wired network connectivity issue. The laptop can connect to the in
defon

By Tx/Rx reverse the technician can address this issue.

C. Tx/Rx reverse

<u>Explanation:</u>

Technician has to trouble the laptop, since the laptop is connected and got internet while is the network resources inside the office. But if he connects the same laptop in research lab end user is not connected

Following troubleshooting to made

1. Routing is done properly

2. Any packet dropping by using TRACE command in windows operating system.

Since DHCP is used in office, whereas same type is not used in research lab. End user can try TX/RX reverse cable to connect in the research laptop.

5 0
3 years ago
What would be the most important data to access in the HRIS for the units and divisions of the MNE to determine feasible HR prog
12345 [234]

The most important data to access in the HRIS to determine feasible HR programs is <u>personnel cost</u>.

<h3>What is HRIS?</h3>

HRIS is an acronym for human resource information system and it can be defined as a software system that is designed and developed, so as to help a business firm to collect, manage, and store detailed data on its employees or workers.

Generally, the important data to access in the human resource information system (HRIS) system for the units and divisions of the multinational enterprise (MNE) to determine feasible HR programs is personnel cost because it would affect the total amount of money that would be spent in training them on how to use the latest technology in the market.

Read more on HRIS here: brainly.com/question/23264557

7 0
2 years ago
What does network administration normally include?
vovikov84 [41]

Answer:

B and D.

Explanation:

An individual working as a network administrator is responsible for a variety of different tasks which can include the design of the network itself, security for the network, and identifying and fixing issues. This is done in order to keep the computer network up-to-date and functioning as intended within the company or organization.

3 0
3 years ago
Other questions:
  • It is better to know the main components of all computer programming languages
    9·1 answer
  • Guardrails are often used by employers to protect workers from falls. How high must the top guardrail be above the working surfa
    12·1 answer
  • What is <br> central vision
    12·2 answers
  • A slow response when opening applications or browsing the Internet, applications that do not work properly, an operating system
    5·2 answers
  • Word documents contain how many sections by default?
    9·1 answer
  • <img src="https://tex.z-dn.net/?f=%28a%20%2B%20b%29%20%20%7B2%7D" id="TexFormula1" title="(a + b) {2}" alt="(a + b) {2}" align
    15·1 answer
  • JAVA
    5·1 answer
  • The core of ___________ is the implementation of intrusion detection systems and intrusion prevention systems at entry points to
    8·1 answer
  • Cara is cleaning her computer when she notices a loose cable connecting to her printer. Which two ports would the cable most lik
    12·2 answers
  • A construction-based client would like to develop an application that can analyze an image of machinery and overlay information
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!