1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arada [10]
3 years ago
6

What might be the best response to a cyberbuly attack

Computers and Technology
2 answers:
Fynjy0 [20]3 years ago
4 0
If you experience a cyberbully attack, you should get an adult and report the bully.
fgiga [73]3 years ago
3 0

If you are being bullied by someone. I think you should tell and adult or someone who can help or ignore the bully so they will stop.



Hope this helps:D

You might be interested in
What is typically unique in each database table?
andriy [413]

ID number APEX  answer

4 0
3 years ago
Read 2 more answers
2. Write a simple program in C++ to investigate the safety of its enumeration types. Include at least 10 different operations on
erastovalidia [21]

Answer:

Check the explanation

Explanation:

To solve the question above, we will be doing some arithmetic and bit wise operations on enum values. in addition to that, we are asserting the array with INTCOUNT  and also printing the size of array i.e 12 and we are adding BIG_COUNT enum value to 5 and the result is 25.

#include<stdio.h>

enum EnumBits

{

ONE = 1,

TWO = 2,

FOUR = 4,

EIGHT = 8

};

enum Randoms

{

BIG_COUNT = 20,

INTCOUNT = 3

};

int main()

{

// Basic Mathimatical operations

printf("%d\n",(ONE + TWO)); //addition

printf("%d\n",(FOUR - TWO)); //subtraction

printf("%d\n",(TWO * EIGHT)); //multiplication

printf("%d\n",(EIGHT / TWO)); //division

// Some bitwise operations

printf("%d\n",(ONE | TWO)); //bitwise OR

printf("%d\n",(TWO & FOUR)); //bitwise AND

printf("%d\n",(TWO ^ EIGHT)); //bitwise XOR

printf("%d\n",(EIGHT << 1)); //left shift operator

printf("%d\n",(EIGHT >> 1)); //right shift operator

// Initialize an array based upon an enum value

int intArray[INTCOUNT]; // declaring array

// Have a value initialized be initialized to a static value plus

int someVal = 5 + BIG_COUNT; //adding constant and BIG_COUNT variable

printf("%d\n",someVal); //value will be 25

printf("%d",sizeof(intArray)); //value will be 12

return 0;

}

Kindly check the attached image below for the Code and Output Screenshots:

6 0
3 years ago
WILL GIVE BRAINLIEST!!!!!!!
stellarik [79]
True











Dhahvdbdbrhhehebdbdbbdbd sorry it has to be longer ahhshdjdjhsjdjdbdnbfbfjfj
7 0
2 years ago
Read 2 more answers
Which of the following algorithmic efficiencies would be considered LEAST efficient?
frutty [35]

Answer:

It is definitely exponential

Explanation:

Think of it from an input perspective. When an input is put in in a linear, constant and polynomial function, it remains constant. The one wildcard of these choices is exponential. Exponential will initially be efficient, but as the input increases it will jump wildely unlike the rest of the options. This is hands down the right answer! Good luck on the rest of the test!

7 0
3 years ago
Read 2 more answers
Which of the following statements is NOT true? a. An infeasible solution violates all constraints. b. A feasible solution satisf
lakkis [162]

Answer:

B. A feasible solution satisfies all constraints.

Explanation:

Linear programming can be explained as a simple technique where we depict complex relationships through linear functions then find the optimum points.

Linear programming is employed for obtaining the foremost optimal solution for a drag with given constraints. In applied mathematics,

real life problem are formulate into a mathematical model. It involves an objective function, linear inequalities with subject to constraints.

Constraints: The constraints are the restrictions or limitations on the decision variables. They usually limit the value of the decision variables.

Hence,

An infeasible solution violates all constraints.

A feasible solution point does not have to lie on the boundary of the feasible region.

An optimal solution satisfies all constraints.

3 0
3 years ago
Other questions:
  • g Create your own data file consisting of integer, double or String values. Create your own unique Java application to read all
    7·1 answer
  • Identify 3 ways mobile phone could be used to contact a bank apart from making a phone call to the bank
    12·1 answer
  • The expectations I would discuss with Erica regarding the usage of the internet
    6·1 answer
  • Which of the following translates packets so that the node can understand them once they enter through a port?
    7·2 answers
  • How to do this PLEASE HELP 80 points!
    15·1 answer
  • I have a question about a hotel tv: So I’ve brought my Nintendo Switch and my dock and plugged it in to the tv. Everything seems
    13·1 answer
  • A popular database software program called ____ offers a wizard and QBE tool to help build and generate SQL queries
    9·1 answer
  • Explain benefits and disadvantages of using BNC over F-Type connectors on coaxial cables
    9·1 answer
  • What is an infrastructure dedicated to one organization
    13·1 answer
  • Who here has an old (preferably 80s) Toyota Celica i just bought mine and want to know how you guys like yours because mine is f
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!