1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ANTONII [103]
3 years ago
6

What is your F O R T N I T E name

Computers and Technology
2 answers:
kolbaska11 [484]3 years ago
6 0

Answer:

don't have name, but would be something cool.

Explanation:

poor, have a splendid day.

Keith_Richards [23]3 years ago
4 0

here you go ^^ i could not do it so i took a screen shot

You might be interested in
Both tangible and intangible property? are not covered by intellectual property protections. are both covered by intellectual pr
LiRa [457]

Answer:

B -both covered by intellectual property protections.

Explanation:

3 0
2 years ago
How did domestication of maize make the city of tenochtitlan possible?
umka21 [38]

The farming of maize began in Mesoamerica in 6000 B.C. The domestication of maize made the city of Tenochtitlan possible by providing the Aztecs the ability to feed millions. Unlike the corn that is known today, the early maize had tiny cobs but dramatically became bigger and more nutritious as time passed.


3 0
3 years ago
Read 2 more answers
What does manual exposure mean
Julli [10]
Amount of light per unit area
6 0
3 years ago
Read 2 more answers
What is the typical first shot that everyone takes? In photography
Firlakuza [10]

Answer:

the sky or of nature in general

Explanation:

7 0
2 years ago
What are the advantages and disadvantages of using thermoset plastics
Alex Ar [27]
Advantages
>fast processing
disadvantages
>limited service temperature performance
4 0
3 years ago
Other questions:
  • How many questions must you answer in Brainly to be able to message people?
    6·2 answers
  • Marty uses a customized database to sort parts and track inventory. The customized database is an example of _____.
    15·1 answer
  • Which statement is NOT a rule for the data source for the mail merge?
    13·2 answers
  • How are special characters added to a Word document? Check all that apply.
    11·2 answers
  • Cloud computing allows organizations to rent computing resources from providers instead of having their own locally managed ____
    7·1 answer
  • The exploitation of a buffer-overrun vulnerability in an application will MOST likely lead to:_________
    15·1 answer
  • 3.4 lesson practice quiz edhesive
    11·1 answer
  • PLEASE HELP ITS TIMED Ishmael would like to capture a selected portion of his screen and then capture actions he performs on tha
    8·1 answer
  • Which statement is true? Select 3 options.
    5·2 answers
  • How is peace circulated?​
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!