1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arada [10]
3 years ago
6

What might be the best response to a cyberbuly attack

Computers and Technology
2 answers:
Fynjy0 [20]3 years ago
4 0
If you experience a cyberbully attack, you should get an adult and report the bully.
fgiga [73]3 years ago
3 0

If you are being bullied by someone. I think you should tell and adult or someone who can help or ignore the bully so they will stop.



Hope this helps:D

You might be interested in
Which is the most popular language used in game programming?
ANEK [815]

Answer:

B C++

Explanation:

The two most common languages for game designers to learn are C++ and Java, although other languages are popular (such as C# for Unity). Another type of programming you may hear referred to is scripting, but that essentially comes down to a type of systems programming.

4 0
3 years ago
Read 2 more answers
Papa Mario of Mario's Pizzeria has baked a huge pizza and cut it into n slices, but he is clumsy and the pizza wasn't evenly sli
rosijanka [135]

Suppose there are n student: 1, 2, 3, ..., i, ..., n.

Now, let's say each want slice size to be: t1, t2, ..., ti, ..., tn.

Let's pizza slices be : s1, s2, ..., si, ..., sn.

Now, it can be said that a student ' i ' will accept a slice of pizza ' si ' only if the size of slice is more then ' ti '.

Logic to distribute: what can be done is we can sort the demand i.e ti of students and also sort the size of pizza slices si. Now, Papa Mario can distribute the sorted slices to students sorted demand(smallest to heighest) one by one as they appear in sorted lists. Now, it will only be possible to distribute the slices to make everyone happy, if and only if in sorted lists of both s and t for each index k, it holds the condition: tk <= sk.

Let me explain you with example:

Lets says size of whole pizza is 100.

Now number of students n = 4.

Let there demands be : 20, 35, 15, 10.

This means 1st student atleast require the slice size of 20 and so on.

Case 1: Papa Mario divides the pizza into slices of size: 25, 20, 20, 35.

=> Now, we sort both lists.

Thus t => 10, 15, 20, 35

and s => 20, 20, 25, 35

Now, as we can see that for all index  tk <= sk, hence pizza can be distrubeted so that everyone can be happy.

Case 2: Papa Mario divides the pizza into slices of size: 30, 20, 20, 30.

=> Now, we sort both lists.

Thus t => 10, 15, 20, 35

and s => 20, 20, 30, 30

Now, as we can see that, for last student with demand of 35, the pizza slice alotted is of size 30, thus he is unhappy, and pizza cannot be distributed so that everyone becomes happy.

Now, after the approach, let's discuss question.

(a) Greedy algorithm paradigm is most appropriate for this problem, as what we are doing is greedily distributing small slices to those students which have least demands first then tackling bigger demands of students, by remaining bigger slices.

(b) As we are mainly sorting thel ist of sizes of pizza slices and student demands, thus we need to use an efficient algorithm to sort the lists. Such an efficient algorithm can be QuickSort() or MergeSort().

(c) Asymptotic running time of our algorithm would be O(n*logn).

3 0
3 years ago
Convert the following hexadecimal numbers to decimal numbers. (Show your work) a. 0xE3 b. 0x4A c. 0xF9
MAVERICK [17]

Answer:

a. 227 , b. 74 , c. 249

Explanation:

a. 0x E3 = 227

Hexadecimal Digit E corresponds to decimal number 14.

So decimal representation = 14 * 16 + 3 = 224 + 3 = 227

b. 0x 4A = 74

Hexadecimal Digit A corresponds to decimal number 10.

So decimal representation = 4 * 16 + 10 = 74

c. 0x F9 =

Hexadecimal Digit F corresponds to decimal number 15.

So decimal representation = 15 * 16 + 9 = 240 + 9 = 249

3 0
4 years ago
Ip ____ is the falsification of the source ip address in a packet's header so that it appears to have come from a trusted or leg
tensa zangetsu [6.8K]
<span>IP spoofing the falsification of the source ip address in a packet's header so that it appears to have come from a trusted or legitimate sender.</span>
5 0
3 years ago
Find the error and rewrite the code with the error fixed.
kap26 [50]

Answer:

Explanation:

1st mistake: Barcode is written with upeer case, that's not the convention for variables in java, only classes.

2nd: Barcode is public, it is convention to always leave variables private then create getters and setters in case you need to change the value but never acess the variable outside the class it belongs. Also the class should at least have a default constructor in case you are going to instantiate an object outside it.

so the product class should be:

--------------------------------------------------------------------

public class Product {

private int barcode;

        public Product() {

        // default constructor

        }

public int getBarcode() {

 return barcode;

}

public void setBarcode(int barcode) {

 this.barcode = barcode;

}

}

-------------------------------------------------------------------------

3rd: in the main class now you can instantiate the 2 objects but you are gonna set the variable and get the value through the method, like this:

public class Main {

 

public static void main(String[] args) {

   

 Product prod1 = new Product();

 prod1.setBarcode(123456);

 Product prod2 = new Product();

 prod2.setBarcode(987654);

 System.out.println(prod1.getBarcode());

 System.out.println(prod2.getBarcode());

}

}

-----------------------------------------------------------------------------------

Assuming the 2 classes (main and product) are in the same package. But in case they are in different packages, just make sure to import the Product class into the Main class so that you can instantiante an object (new Product()) of it.

7 0
3 years ago
Other questions:
  • Which of the following is an acronym? A.RAM B.Every Good Boy Does Fine. C.association D.mnemonic device
    13·1 answer
  • Leslie is looking for better job opportunities in his current career path. Which career planning guideline would help him as he
    6·2 answers
  • Which ammunition security category includes fragmentation grenades mines and explosives?
    5·1 answer
  • ___________ is the term used to describe the time taken from when a packet is sent to when the packet arrives at the destination
    11·1 answer
  • A_______is a limitation imposed on the engineer. It can be a limitation on
    5·1 answer
  • A customer seeks to buy a new computer for a private use at home.The customer primarily needs the computer to use the Microsoft
    8·1 answer
  • The programming interface for a legacy motor controller accepts commands as binary strings of variable lengths.
    15·1 answer
  • LANGUAGE IS PYTHON!!! PLEASE HELP
    12·1 answer
  • What is one advantage of storing numeric data in variables?
    10·1 answer
  • Which file extension would be used to indicate a webpage document?.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!