1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arada [10]
3 years ago
6

What might be the best response to a cyberbuly attack

Computers and Technology
2 answers:
Fynjy0 [20]3 years ago
4 0
If you experience a cyberbully attack, you should get an adult and report the bully.
fgiga [73]3 years ago
3 0

If you are being bullied by someone. I think you should tell and adult or someone who can help or ignore the bully so they will stop.



Hope this helps:D

You might be interested in
Which is a guideline for conducting technical reviews?
olasank [31]

A guideline for conducting technical reviews is to be sure team members have identical skillsets.

<h3>What is Technical review?</h3>

Technical review is a term that connote the application of scientific, engineering, or other form of expertise to know if activity for which a permit is requested attain the standards for giving the permit under the required statute and rule.

Therefore, A guideline for conducting technical reviews is to be sure team members have identical skillsets.

See options below

Which is a guideline for conducting technical reviews?

be sure team members have identical skillsets

involve people from different backgrounds

omit domain experts on the review team

Learn more about guideline from

brainly.com/question/17711902

#SPJ11

7 0
2 years ago
After running a Google Search Ads campaign for several months, Meredith notices sales of her advertised products are starting to
lesya692 [45]

Answer:

The campaign could be improved by 78% if the listed recommendations are followed.

Explanation:

While conducting the following Search advertising program for a few months, Meredith has announced that revenues of its branded goods are beginning to slow. She reviews her Google Advertising Suggestions webpage which states that her campaign's performance ranking is 22 points.

Thus, the campaign will be increased by 78% if the above recommendations are implemented to inform Meredith regarding its Google Search Advertising plan.

5 0
3 years ago
Does anyone know? If you do please answer.
Sidana [21]
Whats the question..
6 0
3 years ago
Design a base class, Road, with the following members:
hichkok12 [17]

I've attached my Java implementation.

Download java
<span class="sg-text sg-text--link sg-text--bold sg-text--link-disabled sg-text--blue-dark"> java </span>
<span class="sg-text sg-text--link sg-text--bold sg-text--link-disabled sg-text--blue-dark"> java </span>
6 0
3 years ago
Which term describes an approach to security similar to defense in depth in that it supports multiple layers, but uses a differe
miss Akunina [59]

Answer:

The answer to this question is Diversity of Defense.

Explanation:

Diversity of defense:- It is an approach for security which supports multiple layers but the catch here is that at each layer a different mechanism of security is used or at most of the layers.The idea is that you do not need to have multiple layers of defense but different defenses also.  

So we conclude that the answer to this question is Diversity in Defense.

3 0
3 years ago
Other questions:
  • To operate a vehicle in Florida, you must _____.
    9·2 answers
  • Microsoft words spell checker
    8·1 answer
  • Can you recover deleted bookmarks on a Chromebook? If so, how?
    5·2 answers
  • A display that is thin, flexible, light, and easy to read in all types of light is
    9·2 answers
  • Frances is rearranging her furniture. (1) Also, she is moving the heavy oak bookcase to the back bedroom. (2) She has decided to
    7·2 answers
  • Nathan wants to create multiple worksheet containing common formatting styles for his team members. Which file extension helps h
    9·1 answer
  • Rose opens her software application and gets a message stating that she has only 16 more uses of the product available. Given th
    15·1 answer
  • Weak Induction
    8·1 answer
  • Your it department enforces the use of 128-bit encryption on all company transmissions. your department also protects the compan
    13·1 answer
  • Will creates an entry in his calendar and marks it as an all-day instance. Which item has he created?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!