1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xxTIMURxx [149]
2 years ago
7

Which is the best Gun is PUBGM1.M4162.SHOTGUN3.CROSSBOW4.GROZAPLS HELP :(​

Computers and Technology
2 answers:
brilliants [131]2 years ago
8 0

Answer:

It all depends on your style and what you prefer or are good at.

Explanation:

If you like mid-long range weapons you might pick an assault rifle or a sniper rifle(Groza, crossbow). If you like a close-mid range weapon you might choose a shotgun or groza.

GrogVix [38]2 years ago
7 0

Answer:

groza

Explanation:

it has the most damage per show with 30 to 40 rounds

You might be interested in
!!! 20 points !!!!!
puteri [66]

Answer: I need more info to answer this question

Explanation:

8 0
1 year ago
Question 1(Multiple Choice Worth 5 points)
vlabodo [156]

Answer:

Information assurance

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Information assurance is a broad category that is typically used by cybersecurity or network experts to protect sensitive user information such as passwords, keys, emails, etc., in both digital and hard-copy forms

6 0
3 years ago
Which is an example of an effective study skill?
Lelu [443]

Answer:

the making note cards and quizzing yourself

Explanation:

5 0
2 years ago
Read 2 more answers
Where do you place the logical test argument in an IF function formula?
Inessa [10]

Answer:

The first argument listed after IF

Explanation:

When the two variables are listed next to each other, Excel will find and calculate the correlation between them.

8 0
3 years ago
Read 2 more answers
Which of the following are responsibilities of information security management? Defining the protection required for systems and
Talja [164]

Answer:

all of them are responsibilities

Explanation:

4 0
2 years ago
Other questions:
  • What is the output after the following code executes?
    14·1 answer
  • Which port-authentication network access control standard forces devices to go through a full authentication, authorization, and
    13·1 answer
  • Controlling the physical world with sensors and digital devices depends on bandwidth and the ability to analyze data in real tim
    5·1 answer
  • What is sun and what does it do?
    12·2 answers
  • Which of the following should you consider when
    5·1 answer
  • Quick!!!!!
    13·2 answers
  • Candy Kane Cosmetics (CKC) produces Leslie Perfume, which requires chemicals and labor. Two production processes are available:
    14·1 answer
  • Help fast fast anyone
    10·1 answer
  • Create a list of 5 potential jobs that students of computer science can obtain.
    9·2 answers
  • Plz..... Add the following Binary numbers 1. 111000 + 1100 + 111111​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!