1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Zepler [3.9K]
3 years ago
12

What are 3 things that can make cyberbullying especially harmful​

Computers and Technology
1 answer:
motikmotik3 years ago
3 0

Answer:

Anxiousness and depression

Suicidal Thoughts

Anger

Explanation:

Three major side affects of cyber bullying are

  1. Anxiousness and depression
  2. Suicidal Thoughts
  3. Anger

Anxiousness and depression

Cyber bullying takes away self esteem and self confidence.Lack of self esteem makes person to feel bad about him/her self and lack of confidence makes taking daily life decision very difficult which all adds up to stress

Anger

Some people might feel powerless while others strike back on the bullies in anger.Unchecked anger can be very dangerous.Burning in the flames of anger a person will plot revenge and can go to any means for this. This starts a never ending bully-victim cycle

Suicidal Thoughts

Depression if not cured can lead to suicidal thoughts. When a person is felling low and have no self confidence death seems an easy way out.

You might be interested in
How are a members details be checked and verified when they return to log back in to the website ?
aksik [14]

Answer:

When you sign into a website, you have to enter a password and username most of the time, which will allow the website to know that you have checked in and it is you, who is using your account.

6 0
3 years ago
Derek’s supervisor is concerned that the company’s security system does not comply with the new standards the company has decide
miv72 [106K]

Answer:

Access Control List is the correct answer to the following question.

Explanation:

The following answer is correct because by the ACL we can access and refusal of services that is controlled. It used to filter traffic for the network and it also used give the extra securities to protect the network. AVL provides an authorization attached to the object that define which persons are allowed for access to the object and operations.

8 0
3 years ago
Jenifer wants to add some more hardware to her computer system. If she is adding a video card and a sound card, what must she us
ruslelena [56]

Answer:OA

Explanation:  expansion slots, the cards need to slide into the slots to become installed in the back of her pc.

3 0
1 year ago
Sona wants to start a business in India. Her friend suggest an idea to her is that to start business operations through an outsi
Alina [70]

Explanation:

to try and start her business

5 0
3 years ago
Write a test program that prompts the user to enter a two dimensional array and displays the location of the smallest element in
alexandr1967 [171]

Answer:

def element_loc():

   is_end = 'n'

   dimen2 = []

   while is_end == 'n':

       par1 = input("Enter rows and columns: ").split(",")

       part = [int(i) for i in par1]

       dimen2. append(part)

       is_end = input("Do you want to add more rows? y/n: ")

   mini = list()

   for i in dimen2:

       mini. append(min(i))

   result = min(mini)

   row_index = mini. index(result)

   col_index = dimen2[row_index]. index(result)

   print("Row: ", row_index, "Col_index: ", col_index)

element_loc()

Explanation:

The python program solution above prompts users for the two-dimensional array and then the rows of the array are compared with the minimum value stored in another list or array. The row index and the column index are gotten from the mini and dimen2 arrays respectively and are displayed as the position of the minimum value in the two-dimensional array.

8 0
3 years ago
Other questions:
  • References are usally innocuous because they are the least personal and direct of the four reference types
    5·1 answer
  • Carlos wrote a check for $44.92 to pay his gas bill. He’ll use the check register to record his transaction. What will be his ne
    10·1 answer
  • Emma has used copyright works of a number of artists in her photo album and cited all of them except one. She may be caught for
    6·2 answers
  • Which feature of a presentation program’s interface provides a list of commands to create, format, and edit presentations?
    14·2 answers
  • Considering the concept of salted passwords, answer the following questions: a. Bob thinks that generating and storing a random
    10·1 answer
  • 2<br><br> What combination of keys turns the value in a cell into a percentage?
    12·1 answer
  • ____ refers to the order in which values are used with operators.
    9·1 answer
  • Why do ineed to upgrade to see answers isnt it enough adds
    15·2 answers
  • ¿En qué situaciones puedo utilizar formato condicional?
    10·1 answer
  • In computer science what are the methods used to protect the information stored by a piece of software called?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!