1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
strojnjashka [21]
3 years ago
9

true or false: if a comment is posted anonymously, it cannot be considered hate speech or cyber bullying

Computers and Technology
2 answers:
vivado [14]3 years ago
8 0

Answer:

false

Explanation:

pickupchik [31]3 years ago
5 0

Answer:

false

Explanation:

Think about it

You might be interested in
Sftp uses which mechanism to provide security for authentication and data transfer?
12345 [234]

Sftp uses SSH mechanism to provide security for authentication and data transfer.

<h3>What are SSH known for?</h3>

SSH or Secure Shell is known to be a kind of a network communication protocol that helps two computers to be able to communicate and also  share their data.

Therefore, one can say that Sftp uses SSH mechanism to provide security for authentication and data transfer.

Learn more about  SSH mechanism from

brainly.com/question/13086077

#SPJ12

3 0
3 years ago
The computer virus is simply a.......... a. diseases b.set of computer instrustruction or code c. types of bacteria​
Svetllana [295]

Answer: b

The computer virus is simply a ___

b. Set of computer instructions or code

4 0
3 years ago
The Boolean Foundation hosted a raffle to raise money for charity and used a computer program to notify the participants about t
irinina [24]

Answer:

The function is as follows:

void sendEmail(string name, string prize, string win_lose){

cout << "Dear "<<name<<", " << endl;

cout << "You are the "<<win_lose<<" of our raffle for charity." << endl;

cout << "The prize was: "<<prize<< endl;

cout << "Thank you for giving to charity!" << endl;

cout << "Sincerely," << endl;

cout << "The Boolean Foundation" << endl;

}

Explanation:

This defines the function along the three parameters

void sendEmail(string name, string prize, string win_lose){

This prints the salutation with the person's name

cout << "Dear "<<name<<", " << endl;

This prints if the person won or lost

cout << "You are the "<<win_lose<<" of our raffle for charity." << endl;

This prints the prize, if any

cout << "The prize was: "<<prize<< endl;

The following is the closing remark

<em>cout << "Thank you for giving to charity!" << endl;</em>

<em>cout << "Sincerely," << endl;</em>

<em>cout << "The Boolean Foundation" << endl;</em>

<em>}</em>

6 0
3 years ago
Who know's web Design
balu736 [363]

Answer: B

Explanation:

inline is the answer

4 0
3 years ago
What is the software that finds websites, webpages, images, and other information called?search applicationsubject directorysubj
san4es73 [151]
It is called a search application
7 0
4 years ago
Read 2 more answers
Other questions:
  • Any method of determining whether an event or object is older or younger than others
    13·2 answers
  • The search engine that makes it easy to find high-quality Web resources by combining Internet technology with traditional librar
    9·1 answer
  • Have main create two objects: setA and setB.Input the values into setA (end with a 0 or negative) and input the values into setB
    12·1 answer
  • A short-circuit evaluation is where each part of an expression is evaluated only as far as necessary to determine whether the en
    14·1 answer
  • Spreadsheet software can be used to do all the following except _____.
    5·2 answers
  • In order for storage devices to be prepared for use, they must be ____________ Group of answer choices pre-prepared loaded initi
    11·2 answers
  • The ____ contains app buttons that allow you to quickly run the File Explorer or Microsoft Edge apps.
    12·1 answer
  • Write fade in shorthand​
    11·1 answer
  • An intruder with malicious intent breaks into an office and steals a hard drive containing sensitive information about the compa
    5·1 answer
  • What are the common uses of joysticks? ​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!