1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fiasKO [112]
3 years ago
14

Please help me willgive u brainliest​

Computers and Technology
1 answer:
diamong [38]3 years ago
4 0

Answer:

fortnite

Explanation:

fortnite battle royale is an online multiplier game

You might be interested in
Please help I I decided to screen shot something in my laptop but now my screen isn’t working or moving can you give me a way to
ehidna [41]

Answer:

Just restart it. It would definitely work.

6 0
3 years ago
Read 2 more answers
A technician is performing Windows preventative maintenance tasks on all computers in the organization. She wants a way to creat
Sedaia [141]

Answer:mmc.exe

Explanation:

mmc.exe is used to manage Windows network with a variety of snap-ins(administrative tools that can be added to the console and used to manage various aspects of your network).

The technician will.be able to use mmc.exe to to create a custom console containing only the tools she regularly launches and then distribute this custom console to each computer.

3 0
3 years ago
What is copyrights used for​
Inga [223]

if something belongs to someone it makes it so someone else cannot steal it and claim it to be their own

4 0
3 years ago
Read 2 more answers
During the reconnaissance step of the attack, what open ports were discovered by Zenmap? What services were running on those por
Setler [38]

Answer:

Following are the solution to the given question:

Explanation:

It sends commands to its Nmap executable platForm, which is used to specified and retrieves the production. The  ZenMap utilizes templates, which are primarily Nmap.

The parameter templates to decide how scans become formed Several ports, like ports, are available: 11, 21, 22, 25, 53, 445, and 3306, all of which run TCP: Linux services, SMTP Postfix, Apache Tomcat/Coyote JSP.

5 0
3 years ago
100 POINTS<br><br><br> does anyone have eddie van der meer tabs?
Jet001 [13]

Answer:

no? lol, sorry but what is that?

5 0
3 years ago
Other questions:
  • What is transmission control protocol?
    7·1 answer
  • With a(n) ____ structure, you perform an action or task, and then you perform the next action in order.
    6·1 answer
  • When you take a multiple-choice test, you are relying on ________, a means of retrieving information out of your long-term memor
    8·1 answer
  • True or false. Every word has only one correct spelling and pronunciation.
    6·1 answer
  • Data hiding, which means that critical data stored inside the object is protected from code outside the object, is accomplished
    14·2 answers
  • What is computer hacking?
    11·2 answers
  • import java.io\.\*; import java.nio.file\.\*; public class TestFileReader { public static void main(String[] args) { Path p = Pa
    14·1 answer
  • List the types of infrared we have
    12·1 answer
  • Use the drop-down menu to complete the sentences about the benefits of flowcharts.
    5·1 answer
  • What are the major benefits of preproduction?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!