1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Wittaler [7]
4 years ago
6

Samuel loves playing the violin, but he feels embarrassed after a classmate posts a video on a social networking site making fun

of him. What step should Samuel take next to stop the cyberbullying? He should report the incident to the social networking site. He should upload his own video making fun of the classmate. He should convince his friends to cyberbully the classmate. He should add the classmate on his friend’s list and follow him.
Computers and Technology
2 answers:
Svetlanka [38]4 years ago
8 0

Answer is A

I did the test on edginuity

myrzilka [38]4 years ago
6 0

Answer:

He should report the incident to the social networking site

Explanation:

You might be interested in
Select the correct answer.
trapecia [35]
OA. programs do not represent data-rate to xomolemrixjf complexity
6 0
4 years ago
How do i delete cookies on a chromebook?
Sphinxa [80]

Answer:

Just go into the browser then go to the searchbar go to any website then click the lock icon in the searchbar then click cookies then go from there

Also you can look this simple info up on g0ogle

6 0
3 years ago
A Trojan horse:
Elis [28]

Answer:

The answer is "option D"

Explanation:

Trojan horse is a software, that is installed on a system and appears benign, but in actual it is the addition of malicious which unexpected modifications in config files and unusual activity even when the computer is idle are strong signs that a Trojan exists on a system. and other options are not correct that can be described as follows:

  • In option A, It is a malware that is also known as Trojan.
  • In option B, It is malware, not a virus but the malware includes viruses.
  • In option C, It doesn't install spyware on the user's computer.
  • In option E, It doesn't use for enterprise networks to penetrate.
4 0
3 years ago
While troubleshooting a connectivity issue in your network, you did a Ping from Host A to Host B, and the Ping was successful. F
xeze [42]

Answer:

Above OSI Layer 3

Explanation:

5 0
3 years ago
If you know the unit prices of two diffferent brands of an item,you are better able to
pantera1 [17]

Answer:

Compare the prices of the two brands.

Explanation:

Price can be defined as the amount of money that is required to be paid by a buyer (customer) to a seller (producer) in order to acquire goods and services.

In sales and marketing, pricing of products is considered to be an essential element of a business firm's marketing mix because place, promotion and product largely depends on it.

One of the importance associated with the pricing of products is that, it improves the image of a business firm.

Hence, if you know the unit prices of two different brands of an item, you are better able to compare the prices of the two brands. Subsequently, the buyer would be able to easily make a decision on which brand's product to purchase.

3 0
3 years ago
Other questions:
  • Video-sharing sites allow videos to be uploaded in which file format? A. .avi B. .svg C. .tiff D. .xls
    5·1 answer
  • In 2–3 sentences, describe how you would find a certain record.
    11·2 answers
  • Vpns can be classified based on the kinds of ____ they connect
    6·1 answer
  • There are two different perspectives in terms of how programs are delivered for different ethnic groups. If an agency offers dif
    14·1 answer
  • Do URLs identify the location of Web content?
    8·2 answers
  • In Windows applications, a ____ control is commonly used to perform an immediate action when clicked.a. text boxb. buttonc. wind
    7·1 answer
  • 1. Give one reason why data is represented in binary in a computer
    15·1 answer
  • What are some professionals that complete network administrator
    11·1 answer
  • 1. Import it into Eclipse. Open the file in Eclipse 2. Edit the file to add comments to identify the instance variables, constru
    9·1 answer
  • What is a computer?write any four features of computer​
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!