1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nutka1998 [239]
3 years ago
10

So, I have an Cru__ on this boy in school and his name is Bray but Yeah.............Can someone help me

Computers and Technology
2 answers:
brilliants [131]3 years ago
7 0
Okay tell them how you feel be yourself don’t act like someone else for him he should like you for who you are just be you and tell us how it goes!!
tester [92]3 years ago
4 0

Explanation:

Okay so, am not a great person at that but my best advice would be. to be yourself. you can always be honest and talk to him privately that you have a crush on him. Dont be afraid and if he doesn't go to well dont feel bad, at least you had the guts to tell him. other girls would be scared.

You might be interested in
A _____ model is one that is automatically adjusted based on changing relationships among variables.
BabaBlast [244]

Answer: dynamically modified model

Explanation:

7 0
2 years ago
PLEASE HELP ME GIVING BRAINLIEST!!<br> 3.4.3: Go Down Slide: Part one
AlekseyPX

                                           above

dgczjklcxhvzkojcvrhyujnhb

explanation:

7 0
2 years ago
What is the difference between a function with parameters, and a function<br> without parameters? *
Romashka [77]

Answer:

A function with out parameters cannot take any arguments or perform operations on variables passed in. A function with parameters can.

8 0
3 years ago
Please answer as soon as possible
kondaur [170]

its the first one x 3/14 bc 2/7 times 3/4 makes 6/28. 6/28 simplified is 3/14

8 0
3 years ago
What does spyware do on your computer?
Morgarella [4.7K]
It's a malware, and it basically let's the person/hacker/culprit get information off your computer without the owner of the computer knowing that the person is doing it. It's often used to find keystrokes, passwords, online interaction, and other personal data.
5 0
3 years ago
Other questions:
  • Nina aspires to be a digital media specialist. What should Nana be familiar with in order to pursue this career?
    9·2 answers
  • What data unit is encapsulated inside a packet?
    5·2 answers
  • Steps to log out of an email account ​
    5·2 answers
  • Assume you are a network consultant for a company that is designing a private WAN to communicate between five locations spread t
    10·1 answer
  • A manager would like information on the knowledge base searches conducted by customers and call center agents. Which two metrics
    10·1 answer
  • Mihaela I. Croitoru – Utilizarea calculatorului personal Microsoft Word dau coroana
    14·1 answer
  • Tomahawk Industries develops weapons control systems for the military. The company designed a system that requires two different
    13·1 answer
  • Write multiple if statements: If carYear is before 1967, print "Probably has few safety features." (without quotes). If after 19
    11·1 answer
  • Critical Thinking Questions
    9·2 answers
  • Why can videos be streamed from the cloud to a computer with no loss in
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!