1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nirvana33 [79]
3 years ago
13

A cyberbully is someone who invades another person’s privacy by

Computers and Technology
2 answers:
e-lub [12.9K]3 years ago
8 0
Insulting or harassing them over the Internet
xxTIMURxx [149]3 years ago
5 0
<span>intimidating someone online with threats.</span>
You might be interested in
What is GND and what color wire do we connect to GND? (this is like for circuits and stuff btw)
fgiga [73]
Ground wire and i believe it is yellow and green
7 0
3 years ago
Panes created using the vertical split bar scroll together horizontally. true or false.
Nataly_w [17]
I think the statement given above is false. Panes created using the vertical split bar do not scroll together horizontally. <span>The two </span>panes scroll together vertically, but scroll<span> independently </span>horizontally<span>. Hope this answers the question. Have a nice day.</span>
4 0
3 years ago
Select the correct answer.
Gnesinka [82]

Answer:

D.

Explanation:

I think.

4 0
2 years ago
An international magazine publisher has commissioned you to do a series of images in black and white. The publisher distributes
CaHeK987 [17]

Answer:

I need to send black-and-white images in a print-ready format. Therefore, here are the steps I’d follow:

First, I’d shoot my images.

I’d use Photoshop to modify or correct the color of the images.

I’d convert the images into black-and-white versions.

I’d save the selected files in the TIFF format. This method will ensure that the images retain their quality and are print-ready.

I’d also convert these files into the JPEG format to get good-quality, low-resolution images for the client’s web publishing.

The Art Director requires images that they can modify, if required. Therefore, I’ll include files in the TIFF and PSD formats. These are open files and anyone can modify them.

I’d send all these saved copies to the magazine for their work.

Explanation:

just did it and it gave me this answer:)

5 0
3 years ago
consider the following code segment, which appears in a method in a class other than password. the code segment does not compile
Romashka [77]

The code segment does not compile because the method 'reset' does not return a value that can be displayed.

A method refers to a block of that which only runs when it is called. It is permissible to pass data, referred to as parameters, into a method. Methods are used to accomplish certain actions, and they are also called functions. As per the given code segment that appears as a method in a class, it does not compile because the method named 'reset' is not returning a value that can be printed on the screen as an output.

"

<em>Complete question:</em>

Consider the following code segment, which appears in a method in a class other than password.

Password p = new Password("password");

System.out.println("The new password is " + p.reset("password"));

The code segment does not compile because _____________ .

"

You can learn more about Method at

brainly.com/question/27415982

#SPJ4

4 0
1 year ago
Other questions:
  • Select the correct answer.
    13·1 answer
  • Smart art can be used to create _____that highlights relationships betweeen two items
    8·2 answers
  • The clear emergence of a leader and the development of group norms and cohesiveness are the key indicators of the ________ stage
    6·1 answer
  • Olivia is trying to save for a new laptop computer. To help her save, she should start a _____. database financial statement per
    7·2 answers
  • 1. ___________ ensures the integrity and security of data that are passing over a network.
    13·1 answer
  • The "fathers of the Internet" are Vinton Cerf and ________. Select one: A. Tim Berners-Lee B. Bill Gates C. Robert Kahn D. Rober
    8·1 answer
  • Which of the following specific components are incorporated on HDInsight clusters?
    13·1 answer
  • Widow in respect to word processing ​
    15·1 answer
  • 8
    7·1 answer
  • Why is it important to continiously conduct penetration testing for a strong security system?.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!