1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arada [10]
3 years ago
6

What might be the best response to a cyberbuly attack

Computers and Technology
2 answers:
Fynjy0 [20]3 years ago
4 0
If you experience a cyberbully attack, you should get an adult and report the bully.
fgiga [73]3 years ago
3 0

If you are being bullied by someone. I think you should tell and adult or someone who can help or ignore the bully so they will stop.



Hope this helps:D

You might be interested in
an ssl client has determined that the certificate authority (ca) issuing a server's certificate is on its list of trusted cas. w
TEA [102]

The next step in verifying the server's identity is:

  • The CA's public key need to validate the CA's digital signature found on the server certificate.

<h3>What is SSL client?</h3>

Secure Sockets Layer (SSL) is known to be a kind of PKI protocol that helps to  authenticate a user's identity and it is one that often encrypt the communication that takes place between the client and the server.

Note that  in the above, the next step in verifying the server's identity is:

  • The CA's public key need to validate the CA's digital signature found on the server certificate.

Learn more about SSL client from

brainly.com/question/14425531

#SPJ11

8 0
2 years ago
What are the uses of navigation keys​
Zolol [24]
The navigation keys allow you to move the cursor, move around in documents and webpages, and edit text.
3 0
1 year ago
You
N76 [4]

Answer: A

Explanation: the process or action of verifying the identity of a user or process.

Hope this helps ^.^

8 0
3 years ago
Read 2 more answers
A customer is experiencing intervals during the day when the file server on her local network cannot keep up with the demands of
levacccp [35]

Answer: Contact the manufacturer and asks for another filter driver device.

Explanation:This issue can occur if a non-Microsoft program installed on your computer uses an outdated kernel-mode filter driver. And it can be that kernel-mode filter driver may be outdated.

3 0
3 years ago
being able to download a chapter of a new book before buying it or trying out a software option for a month before purchasing ar
Natasha_Volkova [10]

Answer:

Experience the product

Explanation:

Being able to download a chapter of a new book before purchasing it is an example of how consumers can experience the product.

6 0
3 years ago
Other questions:
  • 1. Explain what is meant by the following data types:
    11·1 answer
  • Which statement is correct about operating systems? They are hardware devices. They include programs that help people do certain
    15·1 answer
  • Which strategy should individuals working in a diverse workplace adopt?
    13·2 answers
  • Although highly accurate navigational information from the GPS constellation is exploitable by adversary forces, it is unlikely
    5·1 answer
  • A user complains that his new mouse doesn't work right. He has an old system at home and when he has had this problem, he cleane
    11·2 answers
  • What service converts ip addresses into more recognizable alphanumeric names??
    8·1 answer
  • 9.18 LAB: Exact change - methods Write a program with total change amount as an integer input that outputs the change using the
    11·1 answer
  • State 4 basic operation performed by a computer​
    11·2 answers
  • There are some games that cannot be described by a single--or even two-- genres. Can you think of any that should be invented?​
    6·1 answer
  • The Rainbow Trout Company maintains a database of clients. To search through this database, they use ____, a 4GL.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!