1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hatshy [7]
3 years ago
15

What are the best legendary pokemon?

Computers and Technology
2 answers:
djyliett [7]3 years ago
8 0

Answer:

Any EX

Any GX

Pikachu

Raichu

Mew Two

Charizard

Taurus

Gumshoos

Lurantis

Lapras

Incineroar

Dialga

Guzzlord

Lugia

Darkrai

Sigilyph

Xerneas

Explanation:

There are more but it takes a little while to get them all

nikklg [1K]3 years ago
6 0
PICACHU PICACHUUUUUUUUUU
You might be interested in
The ip address 172.16.80.125 is written in binary notation as:
trasher [3.6K]
10101100.00101001000
8 0
3 years ago
Having a low credit score can make it more difficult to: Obtain a car loan Open a new credit card Secure an apartment lease All
-Dominant- [34]

Answer:

all of the above

Explanation:

3 0
3 years ago
Which of the following is the most appropriate wireless technology for real-time location of caregivers and mobile equipment in
Gekata [30.6K]
Wi-Fi is the anwser.Hope I helped.
7 0
3 years ago
What is the important safety information found on a boat's capacity plate?
tigry1 [53]
Written on the boat capacity plate that is important for every captain or owner must be knowledgeable about is the maximum allowable total weight and number of passengers. This is to avoid untoward accident due to over capacity and a ticket for unsafe operation by law enforcements. 
6 0
3 years ago
Angela works for an identity protection company that maintains large amounts of sensitive customer information such as usernames
nata0808 [166]

Answer:the correct answer is the c)

An insider

Explanation:

Insiders that perform attacks have a distinct advantage over external attackers because they have authorized system access and also may be familiar with network architecture and system policies/procedures.

8 0
3 years ago
Other questions:
  • The Active Directory Users and Computers tool can be used to:______.
    11·1 answer
  • Any program that allows the user to select an item from a menu should ________ the user's selection.
    7·1 answer
  • The computer uses unallocated space for what​
    8·2 answers
  • Write an application that inputs a telephone number as a string in the form (555) 555-5555. The application should use String me
    10·1 answer
  • Write a method called makeLine. The method receives an int parameter that is guaranteed not to be negative and a character. The
    11·1 answer
  • The Fibonacci numbers are the numbers
    15·1 answer
  • Frank enters "1" in the field for postal code. What is frank most likely trying to do?
    13·2 answers
  • Selecting missing puppies 1 # Select the dogs where Age is greater than 2 2 greater_than_2 = mpr [mpr. Age > 2] 3 print(great
    8·1 answer
  • A data visualization tool that updates in real time and gives multiple outputs is called
    9·1 answer
  • Data will zip through a 5G network much faster than through a 4G network because of the 10-fold difference in _____.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!