1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Serhud [2]
3 years ago
10

I was killed යඞ what do i do

Computers and Technology
1 answer:
KiRa [710]3 years ago
8 0
Answer:

Ok all you have to do is live if you died , very simple and basic anyone can do it
You might be interested in
2. How is accessing the Internet through a home network and public Wi-Fi similar?​
Romashka-Z-Leto [24]

Answer: it is not the same

Explanation: via public wi-fi u can easily be hacked but your home wi-fi is yours and u are safe there

6 0
3 years ago
Which source would provide the best way to find valid information about climate change
igor_vitrenko [27]
Primary sources would be best
4 0
2 years ago
The term ________ refers to fluid flow back to the pan to empty or drain a circuit.
Strike441 [17]

The term is: transmission flush

8 0
3 years ago
Which activities below might have a negative effect on your online reputation?
Zepler [3.9K]

Answer:

I believe the last 2 maybe even the one above the second to last answer

Explanation:

3 0
3 years ago
What are two preferences a user can indicate for the Junk Email folder?
marysya [2.9K]
Did you mean this?
<span>Controls are divided between two locations: (a) </span>Tools -> Options<span> -> Security -> Junk, and (b) Tools -> Account Settings -> *each account* -> Junk Settings.</span>
5 0
3 years ago
Read 2 more answers
Other questions:
  • true or false manual handling of materials accounts for the primary source of energy in the workplace
    13·2 answers
  • Which of the following definitions describes a chemical hazard?
    8·2 answers
  • ¿Es especial que mi cumpleaños sea el día de San Valentín?<br><br> si o no
    11·2 answers
  • Two samples of dirt are collected from a suspect's tread in his shoe and a crime scene. The forensic investigator does a gross e
    6·2 answers
  • Which is a copyright
    13·2 answers
  • Lisa managed incident response for a bank. The bank has a website that’s been attacked. The attacker utilized the login screen,
    9·1 answer
  • An individual who understands and uses a variety of symbols yet uses one symbol at a time to share a message needs more developm
    10·1 answer
  • What are the best data structures to create the following items? And why?
    13·1 answer
  • What is the first step that you have to perform before you can add a windows package to a wim file?
    9·1 answer
  • ravi met few peoples in a party and was mixing up well those wearing expensives clothing and fair complexion . which factors are
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!