1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
TiliK225 [7]
3 years ago
7

Mohammed's parents learn that his classmates have

Computers and Technology
2 answers:
n200080 [17]3 years ago
3 0

FULL PROBLEM:

Mohammed’s parents learn that his classmates have begun sending him text messages making fun of his heritage. Mohammed says he’s fine because they are just teasing him.

Which challenge is making it difficult to stop the cyberbullying of Mohammed?

A.  The classmates are using secure computers.

B.  The classmates are using technology positively.

C.  Mohammed doesn’t have any evidence of the cyberbullying.

D.  Mohammed doesn’t believe the cyberbullying exists.

ANSWER:

D.  Mohammed doesn’t believe the cyberbullying exists.

GREYUIT [131]3 years ago
3 0

Answer:

Mohammed doesn't believe the cyberbullying exists

Explanation:

Got it right on edgenuity test

You might be interested in
1.1 give five (5) reasons why modeling is an important part of system analysis and design
marissa [1.9K]

Modeling is important because it predicts outcomes, involves the knowledge of variables, analyzes the system, incorporates information and avoids biases.

<h3>What is Modeling?</h3>

In computation, modeling refers to the action of taking into account all variables that produce a given outcome and then predict it in a virtual environment.

Modeling is fundamental in system design because enables the prediction of the behavior of diverse variables simultaneously.

In conclusion, Modeling is important because it predicts outcomes, involves the knowledge of variables, analyzes the system, incorporates information and avoids biases.

Learn more about modeling here:

brainly.com/question/17994947

#SPJ1

3 0
2 years ago
Write a C++ program that reads from the standard input and counts the number of times each word is seen. A word is a number of n
Rufina [12.5K]

Answer:

#include <stdio.h>

#include <string.h>

#include <ctype.h>

 

struct detail

{

   char word[20];

   int freq;

};

 

int update(struct detail [], const char [], int);

 

int main()

{

   struct detail s[10];

   char string[100], unit[20], c;

   int i = 0, freq = 0, j = 0, count = 0, num = 0;

 

   for (i = 0; i < 10; i++)

   {

      s[i].freq = 0;

   }

   printf("Enter string: ");

   i = 0;

   do

   {

       fflush(stdin);

       c = getchar();

       string[i++] = c;

 

   } while (c != '\n');

   string[i - 1] = '\0';

   printf("The string entered is: %s\n", string);

   for (i = 0; i < strlen(string); i++)

   {

       while (i < strlen(string) && string[i] != ' ' && isalnum(string[i]))

       {

           unit[j++] = string[i++];

       }

       if (j != 0)

       {

           unit[j] = '\0';

           count = update(s, unit, count);

           j = 0;

       }

   }

 

   printf("*****************\nWord\tFrequency\n*****************\n");

   for (i = 0; i < count; i++)

   {

       printf("%s\t   %d\n", s[i].word, s[i].freq);

       if (s[i].freq > 1)

       {

           num++;

       }

   }

   printf("The number of repeated words are %d.\n", num);

 

   return 0;

}

 

int update(struct detail s[], const char unit[], int count)

{

   int i;

 

   for (i = 0; i < count; i++)

   {

       if (strcmp(s[i].word, unit) == 0)

       {

           s[i].freq++;

 

           return count;

       }

   }

   /*If control reaches here, it means no match found in struct*/

   strcpy(s[count].word, unit);

   s[count].freq++;

 

   /*count represents the number of fields updated in array s*/

   return (count + 1);

}

4 0
4 years ago
How long is a subnet mask? (Please select one of the four options)
kolezko [41]

Answer: 32 bits

Explanation:

 The subnet mask basically contain 32 bits number which performed various function in terms of mask in the IP address. There are mainly two types IP address that are:

  • Host port
  • Network port

The 32 bit is the mask that is used for the host networking address in the single IP address. If the string represent 1, it means that the subnet mask is the part of the network.  

 

5 0
3 years ago
6. Assume there are three small caches, each consisting of four one-word blocks. One cache is fully associative, a second is two
AURORKA [14]

Answer:

Explanation:

jk...v bbbb n jk

5 0
3 years ago
True or False? Any edition or version of Windows can join a domain.
Veseljchak [2.6K]

Answer: TRUE! 100%

If I was helpful i would to be rated brainliest please thank you!

Explanation:

8 0
2 years ago
Other questions:
  • numbers that the user inputs. You must use JoptionPane to input the three numbers. A first method must be called and used to dev
    13·1 answer
  • How do you mark somebody the brainliest?
    14·2 answers
  • Which one of the following words means most nearly the opposite of RANDOM? (remember,opposite)
    12·1 answer
  • When you first launch the internet, what page will open?
    9·1 answer
  • Write a script that calculates the common factors between 8 and 24. To find a common factor, you can use the modulo operator (%)
    14·1 answer
  • Compressing a file is also called
    9·2 answers
  • Write code to simulate the following differential equation for x ranging from 0 to 5. Assume y = 0 when x = 0. Plot y vs. x usin
    11·1 answer
  • 1.6.M - Assignment: Understanding If Else Statements in Python
    7·1 answer
  • Which can be used to decode a Unicode character encoding into text?
    13·1 answer
  • Level Access Test - Please Ignore
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!