Solved

Lucy Long callup?

Posted on 1998-07-30
2
223 Views
Last Modified: 2013-12-26
what do I do after I signal to my team that Lucy is behind the Maple tree.  I already know that  I am supposed  to use my LASH to advise them that she is unarmed but that is the problem.   I do not knwo what to put in the LASH  I have tried everything that I can think of but I always get yelled at?  
What do I say with the LASH?
0
Comment
Question by:JDinh
2 Comments
 
LVL 1

Accepted Solution

by:
Roke earned 100 total points
ID: 1103604
Use the suspect hand signal.
0
 

Expert Comment

by:tugger
ID: 1103605
you actualy need to use your suspect hand signal then after they ask you if she is unarmed then do the clear hand signal.
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Multiple / Back to Back BSOD 28 643
Can Rocksmith run on LAPTOP PC? 2 1,609
Does FanDuel have party creation? 1 89
Game w 3D galaxy - How should I do vertical distancing? 3 80
Article by: Joseph
CONTENTS I.      What is a MOBA?   a. Definition   b. Origin   c. Current Generation II. The New Games   a. League of Legends   b. Heroes of Newerth   c. Dota 2   d. Smite III. Comparison IV. Conclusion ------------------------…
Author Cited: Konstantinos Dimopoulos URL Cited From: Article from Indie Games: http://indiegames.com/2012/07/browser_game_pick_the_grid.html The Grid (http://codeelf.com/games/grid/) is the sort of game I haven't played in over 10 years. It is …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

820 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question