1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NemiM [27]
3 years ago
13

How can you prevent cyber bullying?

Computers and Technology
2 answers:
laila [671]3 years ago
8 0
Stay off of social media (mainly instagram or maybe snapchat), put yur account on private mode so you can choose who can follow you.
xz_007 [3.2K]3 years ago
7 0
You can stay off websites that have social media our you can just ignore it
You might be interested in
Which of these is one of the primary concerns for protecting your family when online?
Lady_Fox [76]
Sharing personal information
7 0
3 years ago
Read 2 more answers
In the output at the command line from a router that reads - ip ospf message-digest-key 1 md5 CISCO-123 - what does the CISCO-12
11111nata11111 [884]

Answer: a) it is used as a password.

Explanation:

In order to be able to exchange routing information , CISCO routers use an authentication process, so when they send a message (a HELLO message for instance) the router that receives the message confirms that the message is authentic.

There are several types of authentication in OSPF, null, plain  and MD5.

The difference between them is as follows:

1) null, implies that no password is included in the packet header, it's the default mode.

2) plain: In this type of authentication, the password is sent transparently from a router to his neighbor, as a plain text which makes it vulnerable to attacks from packet inspection software, like Sniffer.

3) MD5, is a more secure mode, in which the password is not sent directly, but a hash built based on the packet contents and the password itself instead.

MD5 (Message Digest 5) is the name of the algoritm used to build the hash that receiver will compare with the sent by the sender in order to confirm authentication.

The chosen password, is placed at the end of the command, after the type of authentication (MD5 in this case), which in this case is "CISCO-123".  

7 0
4 years ago
What is it called when a programmer includes a step in an algorithm that lets
Oksanka [162]

Selection is the step in algorithm that let's the computer decide which group of steps to perform.

<h3>What is Algorithm?</h3>

This can be defined as set of instructions which are used for solving a problem or accomplishing a task.

Selection happens when there are one or more options are available in which the computer decide which group of steps to perform.

Read more about Algorithm here brainly.com/question/11302120

3 0
2 years ago
What is a major benefit of working with a ready-to-use cloud-based Artificial Intelligence (AI) vendor service?
Gwar [14]

Answer:

Follows are the solution to this question:

Explanation:

The simple economy is the greatest incentive to join AI and the cloud. The cloud framework enables consumers to buy processing only after traditional installation costs are eradicated. Each company could use these earnings for the advancement of the AI using this model, that's why the dedicated infrastructure is a key advantage of continuing to work via artificial intelligence (AI) cloud-service fully prepared platform.

4 0
3 years ago
Which of the following components serves as both a cover for the bottom of the engine block and a reservoir for engine oil?
nadezda [96]
That would be A. Oil pan
3 0
3 years ago
Read 2 more answers
Other questions:
  • A(n) ____ tag is used to let the compiler know that your intention is to override a method in a parent class
    10·1 answer
  • My ar goal is 16.3 what percent am i at if i have 3 points??
    8·1 answer
  • You can access various sites on the WWW by using hyperlinks or by______. A. entering a key word for your search B. following dir
    12·2 answers
  • T F The exit function can only be called from main .
    10·1 answer
  • What is the benefit of the load balancing logic to end-user?
    15·1 answer
  • What does the history feature in a web browser do
    10·1 answer
  • What are some example of popular music for teenagers
    8·2 answers
  • Can somebody PLEASE help me cancel my subscription I have tried so many different things and contacted support - they are no hel
    14·1 answer
  • In java I need help on this specific code for this lab.
    5·1 answer
  • Knowledge Spark, a school with no current job openings, wants to change to a completely virtual environment and offer classes to
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!