1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leya [2.2K]
3 years ago
11

What is a way to stop cyber bulling

Computers and Technology
2 answers:
dlinn [17]3 years ago
8 0

is this really a question on a assignment or quiz?

lesantik [10]3 years ago
8 0
Be nice to others ;)
You might be interested in
Which best explains a password attached to a document?
Otrada [13]
That is encryption. Encrypted files usually have a password assigned. In order to decrypt the file, you need to have the password.
3 0
3 years ago
The SQL WHERE clause: Limits the row data that are returned. Limits the column data that are returned. ALL Limits the column and
enyata [817]

Answer: Limits the row data that are returned.

Explanation: In structured query language (SQL), The where clause is used as a filter. The filter is applied to a column and as such the filter value or criteria determines the values that are spared in the column on which the WHERE clause is applied. All rows in which the column value does not meet the WHERE clause criteria are exempted from the output. This will hence limit the number of rows which our command displays.

For instance,

FROM * SELECT table_name WHERE username = 'fichoh' ;

The command above filters the username column for username with fichoh, then displays only rows of Data with fichoh as the username. All data columns are displayed but rows of data which do not match fichoh are exempted.

3 0
3 years ago
What's the keyboard command that will allow you to "copy" text?
lana66690 [7]

For mac/apple operating systems; command c to copy command v to paste

For windows operating systems; control c to copy control v to paste

4 0
3 years ago
Read 2 more answers
Panarchy considers the big picture because, in reality, smaller systems are embedded inside of larger systems and they influence
SVEN [57.7K]

Answer:

The connection will be represented by the pair of "Revolt" and "Remember".

Explanation:

  • In a nested structure, the panarchy system links the evolutionary periods. Several connections may have occurred between levels at one point of the engineered process and stages at another.The tags ' revolt ' and ' remember ' are two major connections.
  • Invent, explore, and check the smaller, quicker, clustered levels, while the bigger, slower rates preserve and maintain stored system dynamic allocation.
  • The slower and larger levels, therefore, set conditions under which quicker and smaller ones work.

Therefore, it's the right answer.

4 0
3 years ago
How does one commit accounts receivable fraud?
disa [49]
The answer is B) bill customers for the amount they purchased, but record lower purchases in the ledger and pocket the money. A fraud is one of two types of mistake in the recording process which done with a deliberate intention. The account receivable department responsible for recording sales transaction and billing the customers. Thus, the account receivable fraud can be committed in this process.
5 0
3 years ago
Read 2 more answers
Other questions:
  • What could prevent earmuffs from providing your ears good protection from noise?
    10·1 answer
  • A job application is a form used to make a job request.<br> True<br> False
    8·2 answers
  • Importance of availability of mobile devices content that is of interest for users.
    12·1 answer
  • Which rule should be followed to stay safe online
    5·1 answer
  • A SOHO's connection to the internet is through an antenna that sends and receives a microwave signal to the ISP's antenna. There
    8·1 answer
  • Which file system is designed to verify and autocorrect data faults on the volume without having to bring the volume down for ma
    11·1 answer
  • HELP PLS QUICK TRUE OR FALSE QUESTION
    7·2 answers
  • Primary functions of lighting are sufficient light to...
    13·1 answer
  • Microsoft word is an example of utility software? <br><br>A.true <br>B.false​
    7·2 answers
  • Both tangible and intangible property? are not covered by intellectual property protections. are both covered by intellectual pr
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!