0 Comments
Answer:
1.idk
2. use like c0nd0ms and other protection
3. not using protection
Step-by-step explanation:
9.4m questions
12.2m answers