1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VashaNatasha [74]
3 years ago
6

Mha lovers why do other anime lovers report mha lovers for not liking there anime?

Computers and Technology
2 answers:
Sergio [31]3 years ago
4 0

Answer:

bc they trynna start flamewars

Explanation:

kow [346]3 years ago
3 0

Answer: because it's a lot of hate and dark fanfic but soetimes people are stuck up but we all have opinions

Explanation: Is this logical

You might be interested in
Billy used to take care of his laptop. However, one day he lost his laptop. He lost all his data, and there was no way to retrie
katrin [286]
D he didnt have backup obv

5 0
3 years ago
Read 2 more answers
In general, use no more than _____ font types in a worksheet.
jek_recluse [69]
The answer is a.two
In general, use no more than two font types in a worksheet.
4 0
3 years ago
GUYSSS!!!
otez555 [7]
Yea, I don’t think you can fix it unless you backed it up or something somehow...
8 0
3 years ago
Read 2 more answers
Which of the following shows the assignment of a string to a variable? Select 3 options.
satela [25.4K]

Answer:

23, (23)

Explanation:

7 0
3 years ago
Read 2 more answers
Access to sensitive or restricted information is controlled describes which of the key communications and information systems pr
Viktor [21]

Answer:

C: Security

Explanation:

Communications and information systems principles need to be, among other things, secure. They need to be able to protect sensitive information from those who intentionally not need to know. Some incident information like voice, networks, and data, are very sensitive and thus, should be secure to the right levels and should comply with privacy laws and data protection.

4 0
4 years ago
Other questions:
  • The acronym is used to define the process that allows multiple devices to share a single routable ip address.
    6·1 answer
  • The computer mouse is used to
    7·1 answer
  • Commercial applications are never free<br><br> -True<br><br> -False
    9·1 answer
  • Assign a variable solveEquation with a function expression that has three parameters (x, y, and z) and returns the result of eva
    6·1 answer
  • What type of memory or storage device is prone to losing data if the power goes out?
    5·1 answer
  • A home user reports to a network technician that the Internet is slow. The network administrator discovers that multiple unknown
    12·2 answers
  • You would like to narrow your search on this topic.
    15·2 answers
  • Write code which takes two inputs from the user, a number of sides followed by a side length, then creates a regular polygon wit
    10·2 answers
  • A _______ is a group of elements that you want to style in a particular way.
    8·2 answers
  • Difference between hacking and cracking not hackers and crackers ​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!