1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
strojnjashka [21]
3 years ago
9

true or false: if a comment is posted anonymously, it cannot be considered hate speech or cyber bullying

Computers and Technology
2 answers:
vivado [14]3 years ago
8 0

Answer:

false

Explanation:

pickupchik [31]3 years ago
5 0

Answer:

false

Explanation:

Think about it

You might be interested in
Consider the following method:
RUDIKE [14]

Answer: b.

Explanation:

7 0
3 years ago
Q#1.What general categories of functions are specified by computer instruction?
natali 33 [55]
Is this for a test, because someone else asked that like 5 seconds ago.

4 0
4 years ago
Part 1: Implement a superclass BankAccount that has the following fields and methods.
Alja [10]

Answer:

sorry idk

Explanation:

3 0
4 years ago
Choose all statements that identify the benefits of programming design.
Lubov Fominskaja [6]

Answer:

yes

Explanation:

it provides a design approach to a specific type of problem

4 0
3 years ago
Read 2 more answers
HELP! Identify the parts of the table. <br>A) Primary Key<br>B) Field<br>C) Record<br>D) Table<br>​
joja [24]

The primary key is the block under the Movie ID column.

The Field is the Movie Name.

The Record is the block that goes with the first row of data.

The Table is the bottom block in the center.

4 0
4 years ago
Read 2 more answers
Other questions:
  • A knowledge and skills test is a tool support managers use when selecting new employees; it measures an applicant's understandin
    13·1 answer
  • Why is it important to evaluate the website on which you plan to shop?
    11·2 answers
  • g Write a program that prompts the user for an integer n between 1 and 100. If the number is outside the range, it prints an err
    5·1 answer
  • The term _______ is used to refer to programs that attackers install after gaining unauthorized access to a system, ensuring tha
    15·1 answer
  • The concept of the internet was developed by the u.s. department of defense as a network that ________ in event of an attack.
    8·1 answer
  • What do you understand by storage devices ? Name any two storage devices.​
    11·2 answers
  • How do I convert years to days on Python. For example, if I were to enter 3 years it should output "You are 1095 days old".
    5·1 answer
  • Think about the ways new communication technologies can make certain tasks easier for
    13·1 answer
  • Which items in the list below are viruses. Click in the box to select your answer(s).
    8·1 answer
  • Why do we use the internet so much?​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!