1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nirvana33 [79]
3 years ago
13

A cyberbully is someone who invades another person’s privacy by

Computers and Technology
2 answers:
e-lub [12.9K]3 years ago
8 0
Insulting or harassing them over the Internet
xxTIMURxx [149]3 years ago
5 0
<span>intimidating someone online with threats.</span>
You might be interested in
Answer quickly!!!
ioda

Answer: Harry should check that font he has used are readable on every page and element of his website


Harry should check that all images have alt texts

Explanation: edmentum

7 0
2 years ago
PLEASE I NEED HELP PLEASE PLEASE<br> Which function prompts the user to enter information?
Stels [109]

In python the input() function prompts the user to enter information.

5 0
3 years ago
Why do some people put salt on sidewalks when it snows?
drek231 [11]
It help to melt the snow quicker. they salt eats away the snow.
6 0
3 years ago
Sales management wants a small subset of users with different profiles and roles to be able to view all data for compliance purp
Lapatulllka [165]

Answer:

Last Option is correct answer. ( Option D)

Explanation:

Option A is rejected because this will allow the view permission but as mentioned the management want a new profile for the users as well.

Option B is rejected because again it will not facilitate the different profile requirement.

Option C is not answer because It will only help in viewing the data and granting permission.

Option D is selected because it will meet both requirements which are to make a new profile first of all and then grant the View permissions to these profiles for the user subset.

7 0
3 years ago
Which attributes does not come in tag?
Ne4ueva [31]

Answer:

length is your answer

Explanation:

Have a great day! ^-^

can you me as brainliest if its right? i need 10000 points and 35 brainliest's to rank up to genius

4 0
3 years ago
Read 2 more answers
Other questions:
  • Send a document as a PDF when A. you want the recipient to make changes to the file. B. it needs to be printed. C. it contains m
    10·1 answer
  • The theory of continental drift suggests that at one time,
    15·2 answers
  • Is a type of bullying that takes place when a person intentionally posts negative information about another that is not true
    8·1 answer
  • Which of the following illustrates an example of a Boolean data type?
    15·1 answer
  • You are implementing a new application control solution. Prior to enforcing your application whitelist, you want to monitor user
    5·1 answer
  • You will use the Word application to design, develop, and create a business letter to potential clients of your new business. Th
    15·1 answer
  • A laptop computer manufacturer would consider the computer's processor chip to be a(n) ______ cost.
    14·1 answer
  • HELP<br> When differentiating data, the WHAT of the data is:
    11·1 answer
  • To make the monster pace, you needed the monster to turn ___ degrees.
    7·1 answer
  • Identify the network and the host address in the ip address of 12.128.120.131 with a subnet mask of 255.128.0.0.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!