1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arada [10]
3 years ago
6

What might be the best response to a cyberbuly attack

Computers and Technology
2 answers:
Fynjy0 [20]3 years ago
4 0
If you experience a cyberbully attack, you should get an adult and report the bully.
fgiga [73]3 years ago
3 0

If you are being bullied by someone. I think you should tell and adult or someone who can help or ignore the bully so they will stop.



Hope this helps:D

You might be interested in
A(n) _____ converts the programming instructions written by programmers into a language that the computer understands and proces
qaws [65]

Answer: Translator

Explanation:

each instruction written by programmer in another language must be converted (translated) to machine language in order to process, because computer understand only machine language( 0 and 1). that is translator.

8 0
3 years ago
This type of software can be described as end user software and is used to accomplish a variety of tasks. communications system
dezoksy [38]
This answer to this question is System
3 0
3 years ago
In what ways are computers being used to improve our quality of life
serg [7]

Explanation:

makes info easy to get

improves communication

enhances education

etc

plsss mark me brainliesttt

3 0
3 years ago
A narrative is a:
drek231 [11]
It is B.series of links to other stories.
7 0
3 years ago
Read 2 more answers
we are given an array a consisting of n distinct integers. we would like to sort array A into ascending order using a simple alg
marta [7]

Answer:

Check the explanation

Explanation:

the js code is as follows

function count_max_group(ar) {

if (ar.length < 2) return ar.length; // if no of elements are 2 then max groups are 2

let st = [0]; // stack to store the groups

for (let i = 1; i < ar.length; i++) {

if (ar[i] >= ar[i - 1]) st.push(i); // pushing elements if if ar[i] is greater than the previous element

for (let j = i; j > 0 && ar[j] < ar[j - 1]; j--) { // finding the max number of grps

swap(ar, j, j - 1); // swapping

if (j <= st[st.length - 1]) st.pop();

}

}

return st.length;

}

function swap(a, i, j) { // function to swap two variables

let t = a[i];

a[i] = a[j];

a[j] = t;

}

//sample solutions

console.log("the sample solutions are\n");

console.log("[2,1,6,4,3,7]\n");

console.log(count_max_group([2,1,6,4,3,7]));

console.log("[4,3,2,6,1]\n") ;

console.log(count_max_group([4,3,2,6,1]));

console.log("[2,4,1,6,5,9,7]\n");

console.log(count_max_group([2,4,1,6,5,9,7]));

4 0
4 years ago
Other questions:
  • Which protocols are TCP/IP application layer protocols? (choose all that apply)
    5·2 answers
  • Define a method pyramidVolume with double parameters baseLength, baseWidth, and pyramidHeight, that returns as a double the volu
    11·2 answers
  • Write a program that prints the numbers 1 to 4 on the sameline with each pair of adjacent numbers separated by a single space(1
    5·1 answer
  • TVBCA has just occupied an old historic building in downtown Pittsburgh in which 15 employees will work.
    13·1 answer
  • From the Software Engineering Code of Ethics, which clauses relate to intellectual property (check all that apply)
    15·1 answer
  • Define algorithm<br> Write a small algorithm
    15·2 answers
  • Cash cows are always in
    7·1 answer
  • As related to the use of computers, ____ is defined as gaining unauthorized access or obtaining confidential information by taki
    10·1 answer
  • Pls due soon
    13·1 answer
  • A data analyst creates a data frame with data that has more than 50,000 observations in it. When they print their data frame, it
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!