1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oxana [17]
3 years ago
6

What can hack or code can I use to get a shadow or frost dragon in adopt me

Computers and Technology
2 answers:
Jlenok [28]3 years ago
6 0

There aren’t any codes that could be used to redeem a Shadow Dragon or a Frost Dragon. Even if you’re desperate, do not hack the game as it would get you a permanent ban from the game forever. Try trading up to your dream pet instead of cheating to achieve it!

Mrac [35]3 years ago
5 0

Answer:

you would seriously go that far? there is no way you can hack or code your way to getting one. It comes from trading now. My tip: make any 4 of the same pet to make a neon, which is more than the original pet non-neon.

Explanation:

You might be interested in
PLEASE HELP ASAP!! Timed test!!
maks197457 [2]

Answer:

d i think

Explanation:

6 0
2 years ago
Can you exclude header rows from sort in excel?
Ad libitum [116K]

Answer:

The easiest way to sort excluding first row must be unselecting the first row. keys simultaneously to quickly select the data range from the second row to the end. Then you can sort the data excluding first row.

Explanation:

yes

4 0
2 years ago
Which PlayStation was the first to allow connection between it and computer network
Bezzdna [24]

If you're talking about connecting to the internet internet, it would be the PS2. You could buy an adapter for an ethernet cable to allow for online play.

4 0
3 years ago
Certain files, such as the ____ and Security log in Windows, might lose essential network activity records if power is terminate
Hoochie [10]

Answer:

The answer to this question is a. Event log

Explanation:

Event log in Windows is a comprehensive record of security,system and application notifications stored by the Windows and it is used by administrators to determine problems in the system and foretell issues that going to happen in future.

Operating system and the Apps use event logs to keep account of important software and hardware activity that administrator can use to correct issues with the operating system.

7 0
3 years ago
What was the first 1.0.1 version of openssl that was not vulnerable to heartbleed?
vovikov84 [41]
I suggest you to read OpenSSL changelogs to make it more clear. As there's not enough space to describe how it works. But heartbleed resistan version was 1.0.2, as I know.
5 0
2 years ago
Read 2 more answers
Other questions:
  • Which of the following is NOT an ethical way of getting to the top of a web search?
    5·1 answer
  • If the current through a heater coil is 5 amp and the supply voltage is 120 volts, the coil resistance is A. 0.04 ohm. B. 24 ohm
    6·1 answer
  • HURRY UP NEED HELP!!! What are examples of curricular education? Check all that apply.
    9·2 answers
  • To use the program service routines, the user's program makes requests to the operating system through the
    10·1 answer
  • Can you please answer these questions for me: Is it illegal to copyright? What does it mean to get copyrighted? What are example
    12·2 answers
  • Which statement about images is correct? A) A virtual image cannot be formed on a screen. B) A virtual image cannot be viewed by
    12·1 answer
  • What is not true of credit scores?
    11·1 answer
  • "The ability to assign system policies, deploy software, and assign permissions and rights to users of network resources in a ce
    7·1 answer
  • REPORT THIS USER. HE'S SHOWING HIS YK WHAT TO EVERYONE INCLUDING ME. HIS ACCOUNT PROFILE IS IN THE PICTURE BELOW
    14·1 answer
  • Write a Temperature class that represents temperatures in degrees in both Celsius and Fahrenheit. Use a floating-point number fo
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!