1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Liula [17]
3 years ago
7

Hello, this is mostly meant for 3 certain people (which they are listed in the main comments). I would say only they could answe

r but I can’t control who answers and hopefully they see this, pretty much all I’m saying is I left the Fnaf fandom. And I’m not going to lie it was pretty great! (Not leaving but being in it) but it kinda got boring after a while nobody really made much interesting videos like theory’s or any of that good content I remember when I first found everything. Okay that’s it.
Ew this is cringy .
Computers and Technology
2 answers:
nirvana33 [79]3 years ago
8 0

Answer:

;-; ok

Explanation:

are u doing mha fandom now?

In-s [12.5K]3 years ago
5 0

Answer:

bruh please join back im a new fnaf fandom and i need some help to understand what that is

Explanation:

You might be interested in
SecOps focuses on integrating the need for the development team to provide iterative and rapid improvements to system functional
IRINA_888 [86]

Answer: (B) <em>False</em>

Explanation:

SecOps also known as the Security Operations is referred to as a collaborative or combined effort between Information Technology security and the operations teams that tend to integrate technology, tools, and processes in order to meet the collective aim goals and aim of keeping an organization and enterprise secure while on the other hand reducing risk and also improving organizations agility.

5 0
3 years ago
In order for an IT security framework to meet information assurance needs, the framework needs to include policies for several a
Ugo [173]

Answer:

(1) Protecting the privacy of personal data and proprietary information

(2) Proprietary Information

These two cannot be infringed on but below are the policies that must be taken in high esteem and can be infringed upon

(1) Disaster Recovery Policy

(2) Acceptable Use Policy

(3) Business Continuity plan

4 0
3 years ago
What helps companies and organizations to target masses of people, provide 24/7 services, and deliver better marketing in a chea
Sever21 [200]
The money their making
6 0
4 years ago
An engineer has reported that a printer is no longer working and needs troubleshooting. You have been informed that there is a p
gavmur [86]

Answer:

3D Printer.

extruders are in 3D printers.

7 0
2 years ago
A customer has a new laptop with wireless WAN capabilities; however, the software does not connect to the Internet. What would y
LUCKY_DIMON [66]

Answer:

Check below for the explanation

Explanation:

The following suggestions will be given to the customers:

  • Go to network settings and check the WIFI settings to confirm whether the WIFI connection is on. Switch the WIFI to the on position if it is off.
  • The customer should check if the wireless driver is installed on the computer, if the driver is not installed, he should try to install it
  • The customer should check all the available access points and confirm if their signal strengths are strong enough to allow for any connections. Restart the access point to enhance proper connection.
  • Check to see if your operating system is updated to support your internet connection. You can update your operating system to the latest version
  • Run a Network Diagnostics on your computer. This will run a couple of tests to see what’s possibly causing your Wi-Fi issues.
5 0
4 years ago
Other questions:
  • What is the main storage device where the computer stores data?
    15·1 answer
  • Tiffany is an instructor at a college that is run on student tuition and not state taxes. Which statement best describes her emp
    6·2 answers
  • Help me out here pleaseeeee
    9·2 answers
  • Which of the following dimensions of e-commerce technology involves the integration of video, audio, and text marketing messages
    11·1 answer
  • Given an array A of size N, and a number K. Task is to find out if it is possible to partition the array A into K contiguous sub
    9·1 answer
  • Who's YouTube creator?
    10·2 answers
  • Which of the following is NOT necessary for organizing data to make it easier to sort?
    6·1 answer
  • Just answer in five-line. Question:
    9·1 answer
  • Why is it so important to adhere to principles that have been put forth by reputable organizations to ensure that you are mainta
    10·1 answer
  • a farmer cultivates 1/4 of his farm with ground nuts and 2/5 of it with maize what is the total landnarea that is cultivated​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!