1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kogti [31]
3 years ago
10

In fnaf who´s spring trap in fnaf 3 and who are the five victim names that he murdered and lure them into the back room.

Computers and Technology
2 answers:
andrew-mc [135]3 years ago
5 0

Answer:

i don no sorry

Explanation:

i dont get it

Vedmedyk [2.9K]3 years ago
3 0

Answer:

Springtrap is William Afton, and the names of his victims are Gabriel, Jeremy, Susie, Fritz, and Cassidy

Explanation:

You might be interested in
_____ means collecting vast amounts of data from a host of websites.
xenn [34]

Answer:

D

Explanation:

D. Web Scraping is the answer

8 0
2 years ago
Read 2 more answers
Using the simple alphabet code below, you will decode and encode the message. Write the Full
gladu [14]

Answer:

acefghijlmb2d4k1113589136510waynopqrtuvx2261415161718202122232425

Explanation:

6 0
3 years ago
An educational institution has a number of buildings in the campus. Each building has its own independent network system, and al
Aloiza [94]
Answer: star topology.

Explanation:

The layout of the way how the computers in a netword are interconnected is called network tipology.

Some types of network topologies are:

1) Point-to-point tipology: all the computers are connected to each other directly (computer-to-computer, in pairs, this is a direct link between each two computers).

2) Bus topology: all the nodes (computers or server) are connectect to a maing cable.

3) Star topology: all the computers are connected to a central computer or server which is called central hub. This is the layout described in the question.

4) Ring topology: the computers are connectec in a circular path; each computer is connected to the next computer.

5) Mesh: every computer is connected to every other computer.




8 0
3 years ago
Read 2 more answers
Which of the following should you do if you are exhibiting your photographs?
Naddika [18.5K]

I would go with option a

hope that helped

3 0
4 years ago
Which method is used to edit a function that has been created and inserted into a cell?
8_murik_8 [283]

Answer:

A

Explanation:

A

4 0
3 years ago
Read 2 more answers
Other questions:
  • Learning about public speaking can help improve your ________________.
    15·1 answer
  • Which of the following is the best example of market censorship
    11·2 answers
  • Taken together, the physical and data link layers are called the ____________________. Internet layer Hardware layer Internetwor
    15·1 answer
  • Claire is trying to listen to her history professor's lecture, but her mind keeps wandering to thoughts about her plans for the
    5·1 answer
  • All systems have ___________.
    9·2 answers
  • What does it mean when a computer can't break the rules
    10·2 answers
  • The radix sort
    7·1 answer
  • Self-confidence, blank, and communication are key factors to building positive relationships. Fill in the blank with a 13 letter
    5·1 answer
  • When talking about careers in designing game art, the unit mentioned that a good portfolio and a clear record of experience in g
    9·1 answer
  • HELPPP PLEASE <br><br> Html can be used to create complicated mobile applications <br> True or false
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!