1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alekssandra [29.7K]
3 years ago
11

Best way to steal a ps5

Computers and Technology
2 answers:
timurjin [86]3 years ago
7 0

Answer:

walk in to a store with a mask. no one will question that. wear a hood as well. act as normal as you can. once the clerks back is turn grab it and run.

keep in mind to make sure any tattoos l, colored hair, or scars are covered

I also suggest a get away driver.

I hope this helps :)

faltersainse [42]3 years ago
6 0

Answer:

It was different for me because all I had to do was just BUY the PS5 when it first came out. Now that it has became rare to claim a PS5 (since they stopped making them...), people tend to do whatever they want to "cop" a PS5... One way to steal a PS5 is to use you're PS4 as an excuse stating that it is messed up and won't work correctly because it is out of date, then they'll give you an "update" PS4 (which is a PS5). OR! You can make friends with either a video game outlet worker or whatever. Hook up your new friend by paying him half of what the <u>PS4 </u>costs so that you can slip into the store and retain one. I'm not sure how else to get a PS4 because I never did it.

Explanation:

You might be interested in
What are the MOST likely reasons that a student would research a topic using the internet?
Airida [17]

Answer:

To help with them with their work

5 0
3 years ago
Read 2 more answers
When using VLOOKUP we can search for information from more than one spreadsheet. <br> True or False
Pepsi [2]

heyy man it's true for sure

7 0
3 years ago
What is information technology?
nirvana33 [79]
Information technology is the application of computers to store, retrieve, transmit and manipulate data, often in the context of a business or other enterprise. 
7 0
3 years ago
Stella has captured this candid photograph of a man who was reunited with his son. She has used facial retouching in each of the
riadik2000 [5.3K]

Answer: The last picture it looks better.

Explanation: Welcome!

8 0
3 years ago
Read 2 more answers
Which of the following takes place during the research phase
LenKa [72]
I would say a formulation of the hypothesis
3 0
3 years ago
Other questions:
  • - The __________ is called a single-selection statement.
    10·1 answer
  • Define scanning and why it’s considered one of the most important phases of intelligence gathering for an attacker. Also discuss
    10·1 answer
  • Every chart has a corresponding ____ that contains the numerical data displayed by the chart.
    6·1 answer
  • Pauline is a manager of a team in a large website design firm. Her team members come from diverse cultural backgrounds. The perf
    15·1 answer
  • What federation system technology uses federation standards to provide SSO and exchanging attributes?
    7·1 answer
  • What devices gives input​
    5·1 answer
  • One example of a <br> is the length of a car.
    7·1 answer
  • Which type of chart or graph uses vertical bars to compare data? a Column chart b Line graph c Pie chart d Scatter chart
    14·2 answers
  • 1 2
    5·2 answers
  • Zohan uses the following analogy to describe a concept of object-oriented programming. A button can have many uses. When it is p
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!