1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
My name is Ann [436]
3 years ago
8

How do you get a potion of fire-protection in the overworld because I am having a hard time in the Nether? I will give away 14 p

oints and mark you as brainliest.
Computers and Technology
2 answers:
stepladder [879]3 years ago
5 0

Answer:

It's physically impossible. You'd have to go to the nether and kill one of the nether slimes.

Explanation:

Or you can just cheat, give yourself creative and give yourself a fire res potion. Plus, you can't brew anything without a brewing stand or nether wart.

Nesterboy [21]3 years ago
3 0

Answer:

Get a trident from a drowned and enchant it with Channeling and strike a villager with it. Contain the witch and burn it using flint&steel. It will try to drink the potion, but kill it as fast as you can. There now you can go through the Nether portal without having to worry about lava.

Explanation:

You might be interested in
Insurance can help you:
Blababa [14]
No it can not .............
3 0
3 years ago
You are informed that all the users within the network are unable to access the Internet. You decide to start troubleshooting fr
sveticcg [70]

Answer: Bottom up approach

Explanation:

We should start from the bottom i.e.starting from the physical layer by inspecting the lan, switches, router and also as we move up the level we also need to check the software application and the various routing protocols at each successive levels.

Hence, we use bottom up approach.

3 0
3 years ago
The four main structural elements of a computer system are:
Tom [10]
<span>Processor, Main Memory, I/O Modules, System Bus</span>
4 0
3 years ago
Type of malware that is spread when you distribute
vladimir1956 [14]
Trojans, normal viruses, etc. Anything can and could hop on to the files you send depending on the websites and if you don't have a firewall.
3 0
4 years ago
30 POINTS!!
bulgar [2K]

Answer:

online

the answer is online

7 0
3 years ago
Other questions:
  • Write the execution steps if the input is a lion.
    11·1 answer
  • Traffic collisions are among the top killers of children in America.
    13·1 answer
  • If the list above is named list1 and is implemented as a list, whatstatement would you use to find the number ofelements?list1.s
    9·1 answer
  • What is the definition of D1-D4?
    14·1 answer
  • HELP 11 pointsw to the person who helps me
    11·2 answers
  • Create a program that calculates the tip and total for a meal at a restaurant. Type the code into an IDLE IDE editor window and
    5·1 answer
  • Synapse is not working and is crashing every time you attach it. What should you do?
    13·1 answer
  • Need the answer ASAP!!! I’ll mark brainliest if correct
    5·1 answer
  • The disk you inserted was not readable by this computer
    11·1 answer
  • A user reports that he cant browse to a specific website on the internet. From his computer, you find that a ping test to the We
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!