1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Archy [21]
2 years ago
6

alle Mbawah: Attempt 1 How does a bystander become an advocate? By harassing the bully until he or she stops the harmful activit

y By taking action in either reporting the bully or otherwise supporting the victim By ignoring the situation By becoming a victim him- or herself to show concern Question 3 (5 points) alle Mbawah : Attempt 1 How does a bystander become an advocate ? By harassing the bully until he or she stops the harmful activity By taking action in either reporting the bully or otherwise supporting the victim By ignoring the situation By becoming a victim him- or herself to show concern Question 3 ( 5 points )what is the ans​
Computers and Technology
1 answer:
Stella [2.4K]2 years ago
7 0

Answer:By reporting the bully or supporting the victim that's what I would do

Explanation:

You might be interested in
A throw(...) statement is an alternative way to return from a function or method that indicates some kind of failure occurred.
WITCHER [35]

Answer:

a.True.

Explanation:

A throw statement is used to throw an exception from inside the method.Whenever the throw statement is encountered by the compiler and after that when it is executed the execution of the currently executing method is stopped and it returns back to caller.

There is also a keyword Throws which is used to tell the compiler that the method may throw one or more exceptions.

Hence we conclude that the answer is True.

6 0
4 years ago
Which statement below is incorrect when discussing communication in the online community?
Marysya12 [62]
It's everyone's responsibility to report cyberbullying.

The tone is important whenever you are talking to someone else.

You can literally say anything in virtual world, but you should behave yourself

If everybody knows the common text phrases, then it's fine, but it will be better to talk formally.
8 0
3 years ago
Suppose Alice uses the RSA system with a very large modulus n for which the factorization cannot be found in a reasonable amount
Yuliya22 [10]

Answer:

Encryption method security:-

  • Encryption method representing each alphabetic character as an integer between 0 and 25.
  • Now, apply RSA algorithm for each integer is not an efficient secure encryption method.

Explanation:

  • Let consider alphabetic characters set {A, B... Z} .
  • Each alphabetic character forms a set of message block values M={0,1,2...,25).
  • From encryption method the corresponding cipher text block value C = {0e mod n,1e mod n, 2e mod n,..., 25e mod n}.
  • Then, compute the cipher text with knowledge of Bob's public key;
  • If the public key is generated, then possibility to decrypt the cipher text to plain text.
  • The generated public key is easily calculated by everyone and security is lost.
  • Therefore, the encryption method is not secure.

Encryption method is not secure, Most efficient attack against this method:-

  • Now, compute the encryption message with the function Me mod n for all the possible values of M.
  • This is the most efficient attack against the scheme in encryption method.
  • Then, create a look-up table with cipher text as an index to the corresponding plain text as a value for appropriate location in the table.
4 0
3 years ago
What is the best summation of the main idea in Andrew Blum’s speech, "Discover the Physical Side of the Internet"? Question 10 o
rewona [7]

Answer:

c) We should be aware of the network and geographic presence behind our internet access rather than taking it for granted.

Explanation:

Andrew Blum’s speech is about the physical world and the size of the internet, he spent more time on the computer and cell phone than in the real world, and he had an issue with his internet, and the technician told him, squirrel has bittern your internet.

This can mean that the internet can be something complex and a huge thing, but can be damage for a squirrel, can be something simple.

6 0
3 years ago
What is Aggregate Demand equivalent to?<br><br> A. Real Output<br> B. Nominal GDP<br> C. Inflation
nirvana33 [79]
<span>What is Aggregate Demand equivalent to?

A. Real Output</span>
6 0
4 years ago
Other questions:
  • Programming CRe-type the code and fix any errors. The code should convert non-positive numbers to 1.
    12·1 answer
  • What is "social
    13·2 answers
  • What is a digital certificate? Select one: a. It is a means of establishing the validity of an offer from a person, entity, web
    7·1 answer
  • What are the four types of technical drawing?​
    9·1 answer
  • Write a for loop that prints the values 1 2 4 8 16 32 64 by increasing the value of a counting variable by a factor of two in ea
    15·1 answer
  • Can someone please help me
    15·1 answer
  • Joseph wants to take out the color of the background wall from an image what can Joseph do to achieve this​
    5·2 answers
  • Which of the following jobs usually requires some level of formal higher education other than vocational training?
    14·2 answers
  • Manuel is recording a macro and made a mistake. What is the best option for addressing this situation? O Pause and rewind the ma
    11·2 answers
  • What feature did the 32X add to the Sega Genesis?
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!