1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dahasolnce [82]
3 years ago
10

Quiz #1: In Fnaf 4 After chris gets bit by Fredbear what animatronic does he start to possess and how does he die?

Computers and Technology
2 answers:
GalinKa [24]3 years ago
4 0

Answer:

He starts to posess freddy and he dies in his sleep Which is in Fnaf 4. Freadbear crushed his skull.

Explanation:

Sergio039 [100]3 years ago
4 0

his brother and his friends bullied him and on his b-day, they decided to do a "prank" on him and put his head into fredbears mouth for a few seconds. the springlocks were loose and the jaws fell on chris's head. he was in a coma for a few days till he was pronounced dead a few days after. this event is known as the bite of 87/83.  later on, chris possesed shadow freddy. most of the souls like elizabeth afton, posses the animatronic that killed them, but chris didnt want that.

You might be interested in
Linda has written a program that works well on various operating systems, but she needs to increase the readability of the progr
Naddika [18.5K]
Efficiency because if you don't have very good efficiency then somebody can't really read it so they won't know what it's saying.
5 0
4 years ago
Select the answers that best describe showing respect for confidential data. Check all of the boxes that
kupik [55]

Answer:

The first (The security administrator makes sure to shred and properly dispose of any printed confidential information) and third (The security administrator uses password-protected files and folders on his work computer.) ones are correct.

3 0
4 years ago
Which view in file explorer can use to sort files by column heading
marusya05 [52]

It's details view. I hope this help.    

4 0
4 years ago
__________ is an attempt to gain access to a network by posing as an authorized user in order to find sensitive information, suc
laila [671]
Spoofing is<span> an attempt to gain access to a network by posing as an authorized user in order to find sensitive information, such as passwords and credit card information. </span>
8 0
3 years ago
PLEASE HELP QUICK WILL GIVE BRAINLY
kipiarov [429]

Answer: Where the guide lines?

Explanation: I’ll help but where the guidelines?

7 0
3 years ago
Other questions:
  • Which of the following is an appropriale way to declinc an offer in a<br>professional environment?​
    13·2 answers
  • A company that hires only American Indians is practicing
    5·2 answers
  • Magnetic energy can build up in the atmosphere of the sun. When this energy is finally released, it is 10 million times greater
    15·1 answer
  • How can you create the first row of the table as the header of the table?
    8·1 answer
  • As an IT tech for your company, you have been notified that the Windows domain does not seem to be functioning properly. Being f
    7·1 answer
  • Do you get notified if someone follows you on Spotify like your email or do you just have to find out on your own
    14·1 answer
  • Martha wants to create an image for her Web site. Martha should use _____.
    15·2 answers
  • Which programming language in order takes the most lines code​
    6·2 answers
  • A user calls the help desk to report that a mobile device exhibits very slow performance. What could cause this problem
    9·1 answer
  • What should you try first if your antivirus software does not detect and remove a virus?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!