1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yanka [14]
3 years ago
8

Who plays oblox .............................

Computers and Technology
2 answers:
g100num [7]3 years ago
4 0
MEEEE!!! i love scary games
Kazeer [188]3 years ago
3 0

Answer:

Me

Explanation:

You might be interested in
Which practice is the safest way to sit at a desk while typing on the computer?
qwelly [4]
Lol just lay back and unleash your gamer side
8 0
4 years ago
If the individual accessing the system for disaster recovery purposes were not familiar with the IT system and required system a
Alisiya [41]

Explanation:

Recovery phase is the last phase in any disaster recovery process.

According to the given situation it is better to call System administrator so that the system is recovered properly which even avoids damage of important data stored in the system.

Always it is important to keep credentials for important data or system to avoid unauthorized access. So in the recovery phase, the System administrator would login with the credentials and check for possibility of recovering maximum data out of the system.

4 0
3 years ago
What is Tone's Core Move call in Titan Fall 2?
AleksandrR [38]

Answer:

Tones Core is called "Salvo Core"

8 0
3 years ago
What are the characteristics of the Global Address List? Check all that apply.
nignag [31]

Answer:

It is the very last statement (bottom). Also copied to the the client

Explanation:

3 0
3 years ago
Which is an appropriate strategy for using a workplace blog?
OLEGan [10]

Answer:

a

Explanation:

8 0
3 years ago
Other questions:
  • Clep allows students to do all of thw following except which?
    9·2 answers
  • Should i change my profile pic<br> dont delete
    15·2 answers
  • What is the total utilization of a circuit-switched network, accommodating five users with equal bandwidth share, and the follow
    5·1 answer
  • Which kind of results will appear using the search query "Frosty the Snowman" in quotation marks?
    6·1 answer
  • Identify and describe the four fundamental configurations that are the basis of most Windows printer deployments and describe ho
    11·1 answer
  • Name the default Package of java<br>​
    8·2 answers
  • Create five circles like the Olympic Rings. fill them with the colors given below
    8·1 answer
  • What is a closed system?​
    7·1 answer
  • If you are going to develop a special computer, what would it be and explain it's purpose.​
    15·1 answer
  • Type the correct answer in each box. Spell all words correctly, and use numerals instead of words for numbers. If necessary, use
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!