this isn't really a question ,but a random fact about Fnaf William Aton

Springtrap is possessed by a man named William Afton, or known as Purple guy.William Afton murdered 6 children and stuffed them into suits, now the children posses those suits, Gabriel possessed Freddy Fazbear, Jeremy possessed Bonnie, Susie possessed Chica, and Fritz possessed Foxy, their was one more kid that hadn't had an original so she was stuffed into a Golden Freddy suit.
Who used to be known as Fred bear the bear was already possessed by a child named Evan Afton or C.C (The Crying Child).And since the suit was already possessed Evan Afton was forced out of the suit and now possess a shadow version of Golden freddy known as shadow Freddy.
Shadow Freddy (C.C) was a big part of William Aftons death, C.C lead the animatronics to be dismantled by William, but the animatronics saw that as a chance to get revenge and chased him into a springlock suit called Springbonnie, William Afton was then springlocked and died a slow and painful death from metal being forced in his body and loss of blood.
So you Learn/read that Springtrap is William Afton a serial killer who murdered 6 children and died a slow painful death due to springlocks.
So, thank you for your time.

Answers

Answer 1

Answer:

oop- welp. that's pretty cool

Explanation:

Answer 2

Answer:

this is a game but good job for doing your research

Explanation:


Related Questions

Emma won a laptop at her high school science fair. The laptop does not have antivirus software installed on it so Emma must purchase one. She'll be using the laptop for college applications, schoolwork, and hopefully next year as a college freshman.

Answers

if the question is if she should..

Explanation:

Yes, she should if she plans to  use it for a couple years she should get the best anti virus software :)

In a single paragraph, write about the functions of HTML tags.

Answers

Answer:

The main function of HTML Tag is to define the set of rules for browsers to display the content of web page in a certain way. The content could be anything Text, Image and even video (thanks to HTML5). It tells your browser what to display on the Web Page and how to display it. Overview. People use tags to aid classification, mark ownership, note boundaries, and indicate online identity. Tags may take the form of words, images, or other identifying marks. An analogous example of tags in the physical world is museum object tagging.

Explanation:

Hope this helps        :)

Answer:

The main function of HTML Tag is to define the set of rules for browsers to display the content of web page in a certain way. The content could be anything Text, Image and even video (thanks to HTML5). It tells your browser what to display on the Web Page and how to display it. Overview. People use tags to aid classification, mark ownership, note boundaries, and indicate online identity. Tags may take the form of words, images, or other identifying marks. An analogous example of tags in the physical world is museum object tagging.

Explanation:

Where can
а a
radio be found and how
they used​

Answers

Answer:

I don't know if I'm the only one who doesn't understand I'm sorry.

Explanation:

Choose the correct term to complete the sentence.

______ uses objects that represent classes to manage, manipulate, and store data.

•Object-defined programming

•Object-oriented programming

•Oriented programming

Answers

Answer:

Object-oriented programming

Explanation:

When used in object-oriented programming , a class is a factory for creating object. An object is a collection of data and behavaiors that represent some entity(real or abstract).

Answer: Object-oriented programming

Explanation: got it right on edgen

Justify the following statement: " Diversity should exist in the workplace."

Answers

Answer:

Explanation:

Diversity should exist in the workplace because if everyone working together had the exact same views, there wouldn't be any growth and learning of new ways to expand ideas.

Answer:

Diversity should exist in the workplace because if everyone working together had the exact same views, there wouldn't be any growth and learning of new ways to expand ideas.

Explanation:

e d g e

Write the function greeting that takes a string as input. That string will be formatted as Name Age Hobby, without any punctuation. greeting should split their response into list elements, then use index values to greet them by name and respond that you enjoy that hobby as well, with the format: ‘Hello, ! I also enjoy !' Make sure your output matches this format! For example, greeting('Jose 17 hockey') # => 'Hello, Jose! I also enjoy hockey!' greeting('Cindy 14 robotics') # => 'Hello, Cindy! I also enjoy robotics!'

Answers

Answer:

The function in Python is as follows:

def greetings(details):

   details = details.split(' ')

   print('Hello, '+details[0]+'!, I also enjoy '+details[2])

Explanation:

This defines the function

def greetings(details):

This splits the input string by space

   details = details.split(' ')

This prints the required output

   print('Hello, '+details[0]+'!, I also enjoy '+details[2])

After splitting, the string at index 0 represents the name while the string at index 2 represents the hobby

It is the ornamentation of textiles and other material with needle work
for personal use and decoration.
a. Embroidery
b. Handicraft
c. Recycling
d. Sewing

Answers

A! Embroidery is the ornamentation of textiles using needle work

An archaeologist is dating several recently uncovered sites. She estimates that the site featuring a post-and-lintel design is older than the site featuring corbelled arches. Why might she have reached this conclusion?

The corbelled arch did not become common until the first century C.E.
The post-and-lintel design was discontinued at the end of the Neolithic Era.
The corbelled arch required more advanced knowledge to create than the post-and-lintel design.
The post-and-lintel design did not require slave labor, unlike the corbelled arch.

Answers

Answer:

Its b

Explanation:

just took the test

How does HTTP rely on other layers of the internet?

DNS -

TCP-

IP-

Physical Internet -

Please help !!!

Answers

Answer:

All of your communications are being sent over the Internet so these requests are being sent inside TCP/IP packets and over the physical wires of the Internet. ... It uniquely identifies the location of each computer or device connected to the Internet.

What are your initial thoughts regarding copyright and fair use after watching the clip?

(The clip is The Clock by Christian Marclay, just a 3-minute clip 2010-2011 you can find on YT)

Answers

The answer is A you’re welcome

Who else hates brainly cause they took over 400 points out of my other account and left me at -324 points so copy and paste this every where

Answers

SAME! Instead, it was 630!! It was so unfair tbh, and I did nothing wrong.

Answer:

That's terrible :(

Explanation:

You've just received an e-mail message that indicates a new serious malicious code threat is ravaging across the Internet. The message contains detailed information about the threat, its source code, and the damage it can inflict. The message states that you can easily detect whether or not you have already been a victim of this threat by the presence of the three files in \Windows\System32 folder. As a countermeasure, the message suggests that you delete these three files from your system to prevent further spread of the threat. What should your first action based on this message be?a. Perform a complete system backup.b. Verify the information on well-known malicious code threat management web sitesc. Distribute the message to everyone in your address book.d. Reboot the system.e. Delete the indicated files if present

Answers

Answer:

B.) Verify the information on well-known malicious code threat management web sites

Explanation:

Of course, you should verify the message with reliable sources before taking any actions that could impact your computer. Even if the message seemed legit, it telling you to fiddle with the Windows system folder is a red flag.

Verify the information on well-known malicious code threat management web sites. The correct option is b.

What is malicious code threat?

The threat posed by malicious code to application security cannot be effectively addressed by traditional antivirus software on its own.

Attack scripts, viruses, worms, Trojan horses, backdoors, and malicious active content are all examples of the broad category of system security words known as harmful code.

Malware attacks are frequent cyberattacks in which the victim's system is compromised by malware, which is typically malicious software.

Ransomware, malware, command and control, and other specialised sorts of attacks are all included in malicious software, sometimes known as viruses.

The notification advises you to remove these three files from your system as a countermeasure to stop the threat from spreading further, but you should first double-check the information on reputable harmful code threat management websites.

Thus, the correct option is b.

For more details regarding malicious attacks, visit:

https://brainly.com/question/13137381

#SPJ5

Price of ETH coin right now?
Don't answer if u don't know.

Answers

Answer:

58,715.40

Explanation:

who is father of computer?​

Answers

Charles cabbage is thehshshshdhshshshshshdh

I bought RP-HF410B Pannasonic Bluetooth wireless headphones. They work perfectly well on my iPhone, but my windows 10 won't detect it.

Bluetooth works perfectly fine as it shows my phone (and other Bluetooth devices), but not my headphones.

I tried both the "connect" in Action Center and "Bluetooth & other devices" in settings; same result.

What am I to do?

Here's a summary:

Phone-laptop✔️

Phone-headphones ✔️

Headphones-laptop ❌

Answers

Answer:

In my opinion,

Explanation:

I would go to your local phone store of something like that and ask what is going on because that happened to me and they said to power to laptop and power it on.

HELP mE PLZ

Gabby needs to perform regular computer maintenance. What should she do? Check all that apply.

Remove unwanted files.
Reboot the computer.
Back up her data.
Scan for viruses.
Delete the browsing history.

Answers

Answer:

scan for viruses

remove unwanted files

back up her data

What is the output?

class car:

model = "

age = 0

myCar = car()

myCar.age= myCar.age + 10

print(myCar.age)

Output: ___

Answers

Answer:

10

Explanation:

# A class named car is created

# There are two variables in the class, model and age.

# model is a string holding value for the model of the car.

# age is an integer holding value for the age of the car.

class car:  

   model = ''   # model is initialized as empty string

   age = 0       # age is initialized as 0

myCar = car()    # creating a car object named myCar

myCar.age= myCar.age + 10   # the value of the age is updated by adding 10. (Note that myCar was our object. If we want to access any properties of the object, we type the object name, . , and the property name. Initially, age was 0, we added 10 to it and it becomes 10)

print(myCar.age)    #prints the age of the myCar object, 10

Hello anyone to speak?

Answers

Answer:

hey hope you have a good day or night :)

Which import option is not supported in Access 2016?

from Access
from Excel
from PDF
from Text file

Answers

Answer: from PDF(C)

Explanation:

Took it on edg

Answer:

C

Explanation:

Manuel owns a small business. He needs to calculate the amount each employee owes in Federal taxes. Manuel should
use an)
O e-mail
O printer
O database
O spreadsheet

Answers

I think a database because if he’s calculating then he won’t need a printer or email

Answer:

The answer is spreadsheet

Explanation:

I just took the test too

The __________ gear is the input gear.
A. Drive
B. Driven

Answers

Answer:

A) Drive

Explanation:

Driven is past tense

Driven is usually used more in sentences with out a car like "It had driven her crazy"

WHAT DOES THE SCRATCH CODE BELOW DO?

Answers

i think the correct answer would be b but im not 100% so if i’m wrong please lmk :]

Design a program that ask the user to enter a series of positive numbers. The user should enter a negative number to the series. After all the positive numbers have been entered the program should display their sum

Answers

Answer:

total = 0

while True:

   number = float(input("Enter a number: "))

   

   if number < 0:

       break

   

   total += number

   

print("The total of the positive numbers entered is", total)

Explanation:

*The code is in Python.

Initialize the total as 0

Create a while loop. Inside the loop:

Ask the user to enter a number. Check the number. If it is smaller than 0 (This means it is a negative number), stop the loop using break. Add the number to the total (cumulative sum). (This way your program keeps summing numbers until you enter a negative number)

When the loop is done, print the total

How would I tell Tracy to move forward 100 pixels?

Answers

Answer:

Though the forward(100) command will move Tracy forward 100 pixels, the command backward(-100) can also be used.

Explanation:

Answer:Though the forward(100) command will move Tracy forward 100 pixels, the command backward(-100) can also be used.

Explanation:

Which symbol should you use for entering a formula in a cell?
А.+
B.=
C. $
D.%
E#

Answers

Answer:

ITS + AND =

Explanation:

Answer:

Explanation: The equals operator is used in the Microsoft excel for the indication of formula in a cell .

Explanation:

Codehs 9.4.5 Phone Book. Anyone have the answers?

Answers

Answer:

The program is as follows:

phonebook = {}

while True:

   entry_name = input("Name: ")

   if entry_name == " ":

       break

   elif entry_name in phonebook:

       print(entry_name+" exists with the phone number "+str(phonebook[entry_name]))

   else:

       entry_number = input("Number: ")

       phonebook[entry_name] = entry_number

print(phonebook)

Explanation:

This creates an empty dictionary for phonebook

phonebook = {}

This loop is repeated until it is exited by the user

while True:

Prompt for name

   entry_name = input("Name: ")

If name is empty

   if entry_name == " ":

Exit the loop

       break

Else if name exists in the phonebook

   elif entry_name in phonebook:

Notify the user with the name and the phone number

       print(entry_name+" exists with the phone number "+str(phonebook[entry_name]))

If otherwise,

   else:

Prompt the user for phone number

       entry_number = input("Number: ")

Save in the dictionary

       phonebook[entry_name] = entry_number

Print the phonebook

print(phonebook)

Answer:

my_dictionary = {}

while True:

   name = str(input("Enter a name: "))

   if name == "":

       break

   elif name in my_dictionary:

       print("Phone Number: " + my_dictionary[name])

   else:

       phone_number = input("Enter this person's number: ")

       my_dictionary[name] = phone_number

print(my_dictionary)

Explanation: code hs

Explain how malware can be used in cyber warfare or a cyber terrorism attack on a country?

Answers

Answer:

Malware can be utilized to damage infrastructure that utilizes computers. It can manipulate what a computer is doing. In this way, a piece of malware could be designed to target government operations, such as government office computers, and then steal and wipe data from a computer. In other ways, a piece of malware could target the water supply control computers, and removing safety features, or target the power grid. This is why infrastructure necessary for day to day life and survival should be separate from the Internet, which can remove a major vulnerability.

A person who is good with numbers and problem solving has which type of learning preference?
a) hands-on
b) verbal
c) logical
d) visual

Answers

Answer:

I believe it is logical.

Answer:  c) logical

Explanation:

:)

Use the drop-down tool to select the correct answer.

Government agencies work to catch people who engage in software piracy, and can also help to stop them by filing lawsuits.

Answers

Answer:

Software producers

Explanation:

Patent can be defined as the exclusive or sole right granted to an inventor by a sovereign authority such as a government, which enables him or her to manufacture, use, or sell an invention for a specific period of time.

Generally, patents are used on innovation for products that are manufactured through the application of various technologies.

Basically, the three (3) main ways to protect an intellectual property is to employ the use of

I. Trademarks.

II. Patents.

III. Copyright.

Copyright law can be defined as a set of formal rules granted by a government to protect an intellectual property by giving the owner an exclusive right to use while preventing any unauthorized access, use or duplication by others.

Hence, government agencies work to catch people who engage in software piracy, and software producers can also help to stop them by filing lawsuits. Software producers or developers are saddled with the responsibility of filing lawsuits against pirates or intellectual property theft who engages in the illegal use of patents or licensed software applications.

A salesman has been traveling to different businesses all day to give a sales presentation. Each time, he was starts up his laptop and logs into Windows to show his PowerPoint presentation to the customer. During his second appointment, his laptop lost power and shut itself off abruptly. He arrives at his third appointment and plugs in his laptop to recharge it. When he powers on his laptop, he sees a very low resolution version of his normal desktop. He attempts to change the resolution from 800 x 600 to 1920 x 1080 (his normal resolution), but cannot find it in the Display Settings options inside of Windows. Which of the following could be the cause of this error?
A. Corrupted or missing display driver
B. Graphic card failure
C. Corrupted motherboard firmware
D. Corrupted memory module

Answers

Answer:

A. Corrupted or missing display driver

Explanation:

The most likely reason for this problem would be a corrupted or missing display driver. The display driver is in charge of grabbing the information from the graphic card and adjusting all the necessary settings so that all of the graphic card's power is able to be utilized. Missing or corrupt drivers can cause errors such as laggy display, wrong resolution/minimum resolution, missing display settings, etc. A graphic card failure on the other hand would show no image on the screen whatsoever when turning on the computer.

Other Questions
2. Find the volume of a rectangular prism with a length of 2.4 ft, a height of 4.5 ft, and a width of 1.3 ft. An annual pass to an amusementpark costs $87.95 per person. Ifthe park makes $52,770 from thesesale of passes, which equation canyou use to find the total number ofannual passes purchased? I will give brainliest if you know the answerHow did Saddam Husseins government in Iraq differ from the governments of Iran and Afghanistan?Saddam Husseins government was secular (nonreligious).Saddam Hussein was fully supported and popular among his people.Saddam Hussein opposed education and modernization.The United States had never supported Saddam Hussein. HELP ASAP!!! WILL MARK BRAINLIEST IF RIGHT!Mr. Mole left his burrow that lies 7 meters below the ground and started digging his way deeper into the ground, descending at a constant rate. After 6 minutes, he was 161616 meters below the ground.Let y represent Mr. Mole's altitude (in meters) relative to the ground after x minutes.Complete the equation for the relationship between the altitude and number of minutes.y= How was Hiroshima affected by the atomic bomb? What happen in Easter island could it happen in modern times? Lee la pg de tu libro de espaol 6 grado y contesta las siguientes preguntasCul es la posicin del narrador?Donde se encuentra?Que caractersticas tienen los personajes?Cmo es el ambiente en donde se desarrolla la historia?Que recursos se utilizan en el guion teatral para saber cules son las acciones que debe seguir un personajeQue diferencias existen en la forma en la que ablan los personajes de los cuentos que han ledo antes y la manera en que lo hacen en la obra teatral is this right plz help What is NOT a function of the reticular formation? a. sleep b. breathing c. memory d. pain transmission Question 56 ptsThe lengths of the sides of a triangle are given. Determine if the side lengths create a righttriangle.a) 3, 8, 10 b) 9, 40, 41 c) 12, 20, 16 explain how to write an equivalent expression using the distributive property 2(11+y) Assume Caterpillar, Inc. (CAT) reports investments in affiliated companies, consisting mainly of its 50% ownership of Shin Caterpillar Mitsubishi, Ltd. Caterpillar reports those investments on its balance sheet at $576 million, and provides the following footnote in its 10-K report. Investments in unconsolidated affiliated companies Our investments in affiliated companies accounted for by the equity method consist primarily of a 50% interest in Shin Caterpillar Mitsubishi Ltd. (SCM) located in Japan. Combined financial information of the unconsolidated affiliated companies accounted for by the equity method (generally on a three-month lag, e.g., SCM results reflect the periods ending September 30) was as follows:Years Ended December 31 (Millions of Dollars) 2011 2010 2009Results of operations: Sales $4,007 $4,420 $4,140Cost of sales 3,210 3,526 3,257Gross profit $797 $894 $883Profit $157 $187 $161Caterpillar's profit $73 $81 $73Sales from SCM to Caterpillar of approximately $1.67 billion, $1.81 billion and $1.73 billion in 2011, 2010 and 2009 respectively, are included in the affiliated company sales. In addition, SCM purchased $268 million, $273 million and $282 million of products from Caterpillar in 2011, 2010 and 2009, respectively.December 31 (Millions of Dollars) 2011 2010 2009Financial position: Assets Current assets $2,062 $1,807 $1,714Property, plant and equipment-net 1,286 1,119 1,120Other assets 173 176 194 3,521 3,102 3,028Liabilities Current liabilities 1,546 1,394 1,348Long-term debt due after one year 269 309 318Other liabilities 393 145 188 2,208 1,848 1,854Ownership $1,313 $1,254 $1,174Ceterpillar's investment in unconsolidated affiliatedcompanies, December 31 (millions of dollars) 2011 2010 2009Investment in equity method companies $576 $542 $540Plus: Investment in cost method companies 16 20 25Investment in unconsolidated affiliated companies $592 $562 $565Required:What assets and liabilities of unconsolidated affiliates are included on CAT's balance sheet as a result of the equity method of accounting for those investments? whats the answer? (picture) Will mark brainliest to whoever helps! 30 POINTSI think i have it right this time I WILL GIVE YOU BRAINNEST!!!! 30POINTS!!!! The brain can affect the way the body functions but the body can not affect the way the brain functions.A. TrueB. False Select the correct answer from each drop-down menu. Fill in the correct terms to complete the description of Mischa going through the home-buying process Mischa wants to buy a home. She has looked at the housing market. Now she needs to find a ______ to become _______ for a mortgage. By doing so, Mischa will know how much she has to spend on a house. A.real estate agent B.lender C.closeing company D.title company a.eligible b.wait listed c.credit checked d.prequalified Old Navy charges $30 for 4 t-shirts and $45 two pairs of pants. If Uniques mom orders 9 t-shirts and 6 pairs of pants, how much will Uniques mom spend? In a classroom, there are 3 more girls than boys and the ratio of girls to boys is 6 to 5.What equation represents "there are 3 more girls than boys?"A. G = B + 3B. B = G + 3C. 6B = 5GD. 6G = 5B PLS HELP Which environmental concern is MOSTassociated with Canada's timber industry?A. The creation of acid rainB. The reduction of air quality C. The pollution of freshwater D. The destruction of habitats