1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lapo4ka [179]
2 years ago
7

Who are all the fnaf characters?

Computers and Technology
1 answer:
vitfil [10]2 years ago
8 0

Answer: Freddy Bonnie Chica Foxy Golden Freddy Endo 01 Toy Freddy Toy Bonnie Toy Chica Mangle Balloon Boy Marionette Withered Freddy Withered Bonnie Withered Chica Withered Foxy Withered Golden Freddy Shadow Freddy Shadow Bonnie Endo 02 JJ Phantom Freddy Phantom Balloon Boy Phantom Chica Phantom Foxy Phantom Mangle Phantom Puppet SpringTrap Nightmare Freddy Nightmare Bonnie Nightmare Chica Nightmare Foxy Nightmare Balloon Boy Nightmarionette Nightmare Nightmare FredBear Nightmare JJ Plushtrap.




Explanation: I can only tell you fnaf 1, fnaf 2, fnaf 3, fnaf 4

You might be interested in
let's imagine you're searching for hotels in searching chicago, what should you search for in order to get the most relevant res
n200080 [17]

Trivago, Trip advisor,

3 0
3 years ago
What is a generic phone
Zina [86]

Explanation:

Generic Android Device means the Android devices which does not any specific brand name or they can not be related to any specific class or brand. For ex: Samsung developed Epic 4g Touch Android device but they later removed lot of fancy features and stuffs from it launched with Galaxy S.

3 0
2 years ago
Read 2 more answers
Which of the following is a proprietary OS for desktop and laptop computers?
Leni [432]

Answer:

That would be Windows.

Explanation:

If you have any questions feel free to ask in the comments - Mark

Also when you have the chance please mark me brainliest.

3 0
3 years ago
What can be done in order to secure a WLAN/wireless access point?
polet [3.4K]

Answer:

this may help "Change default passwords. ...

Restrict access. ...

Encrypt the data on your network. ...

Protect your Service Set Identifier (SSID). ...

Install a firewall. ...

Maintain antivirus software. ...

Use file sharing with caution. ...

Keep your access point software patched and up to date."

Explanation:

4 0
3 years ago
When purchasing a security program, you must make sure that _____. Select 2 options.
olganol [36]

Answer:

it is complex

employees are not involved

4 0
3 years ago
Other questions:
  • In the C-SCAN disk scheduling algorithm, the disk arm is required to move in one direction only until it reaches the last track
    7·1 answer
  • What is one concern associated with web-based applications?
    12·1 answer
  • Does technology make us more alone?
    15·1 answer
  • If you specify a user without specifying a hostname, mysql will
    13·1 answer
  • What can you use with your keywords to narrow your search if you complete an internet search using a search engine and do not ge
    15·2 answers
  • What is an internal node?
    11·1 answer
  • Refer to the color wheel to identify the color scheme.
    13·1 answer
  • Servlet session and JSP session have different abilities.TrueFalse
    9·1 answer
  • Air circulation is caused by ... A Earth's rotation around the sun B winds that move vertically C moving air between hot and col
    11·1 answer
  • Alicia uses a software application to store the names, email addresses, and phone numbers of her friends in alphabetical order. 
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!