1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kogti [31]
3 years ago
10

In fnaf who´s spring trap in fnaf 3 and who are the five victim names that he murdered and lure them into the back room.

Computers and Technology
2 answers:
andrew-mc [135]3 years ago
5 0

Answer:

i don no sorry

Explanation:

i dont get it

Vedmedyk [2.9K]3 years ago
3 0

Answer:

Springtrap is William Afton, and the names of his victims are Gabriel, Jeremy, Susie, Fritz, and Cassidy

Explanation:

You might be interested in
Jack has determined that a virus has infiltrated his computer and corrupted several of his data files. Which two utilities would
Romashka [77]
Antivirus programs to detect and eliminate viruses such as Malwarebytes, Stinger, etc.

A hard drive to backup all of his remaining files.

Corrupted files are not always possible to recover, but it's worth a try using a software such as Recuva.
7 0
3 years ago
Read 2 more answers
What do want in future (computer enginner )<br>​
Debora [2.8K]
I wish to be a professor or maybe a singer/rapper and if they fail, then I wanna be a model

✨hope this helps✨

✨SammySilkWorm waz here✨

Here is my modeling shot

6 0
3 years ago
Read 2 more answers
Which of the following is true about file formats?
statuscvo [17]

Answer:

A

Explanation:

The answer is A mate, if you need any help let me know please

3 0
3 years ago
Read 2 more answers
Codes 7.2.8: Listed Greeting python<br> pls help i have no idea on how to fix this
kumpel [21]

The listed greetings program is an illustration of Python functions.

The error in the program is that the program is not properly indented.

Python program uses indents to identify blocks of code.

So, the fix to the program is to properly indent the code, and the fix (without the comments) is as follows:

def greetings(s):

   x = s.split()

   print("Hello, "+x[0]+"! I also enjoy "+x[1]+"!")

Read more about Python programs at:

brainly.com/question/16240699

3 0
3 years ago
You can protect yourself from identity theft by using ____ when transmitting information over network connections. a. cookies b.
Yakvenalex [24]

Answer:

D

Explanation:

Encryption secures transmissions on the internet to or from your PC

5 0
3 years ago
Other questions:
  • We see color because an object that has light striking it
    7·1 answer
  • The region which satisfies all of the constraints in graphical linear programming is called the:
    8·1 answer
  • A user complains that Skype drops her videoconference calls and she must reconnect. At which layer of the OSI model should you b
    9·1 answer
  • How do you get the value of an element in an array? And how about for an ArrayList?
    14·1 answer
  • Software project management is the process planning, organizing, and monitoring of the development of a software project from it
    15·1 answer
  • Why do we use the internet so much?​
    6·1 answer
  • Who was the first person to develop http the language in which servers and browsers communicate
    11·1 answer
  • Data becomes _____ when it is presented in a context so that it can answer a question or support decision makin
    13·1 answer
  • Does every loop structure require curly braces?<br> A. yes<br> B. no
    11·1 answer
  • leon started a project to design and create a new video game for the animation studio where he develops graphics and animations
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!