1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sashaice [31]
2 years ago
15

Can someone write me a cyber bullying brochure I need it ASAP

Computers and Technology
2 answers:
Sever21 [200]2 years ago
8 0

Answer:

how quick do you need it

Contact [7]2 years ago
7 0

Cyberbullying facts:

About 37% of young people between the ages of 12 and 17 have been bullied online. 30% have had it happen more than once.[1]

95% of teens in the U.S. are online, and the vast majority access the internet on their mobile device, making it the most common medium for cyber bullying.[2]

23% of students reported that they’ve said or done something mean or cruel to another person online. 27% reported that they’ve experienced the same from someone else.[3]

Girls are more likely than boys to be both victims and perpetrators of cyber bullying. 15% of teen girls have been the target of at least four different kinds of abusive online behaviors, compared with 6% of boys.[4]

About half of LGBTQ+ students experience online harassment -- a rate higher than average.[5]

Instagram is the social media site where most young people report experiencing cyberbullying, with 42% of those surveyed experiencing harassment on the platform.[6]

Young people who experience cyberbullying are at a greater risk than those who don’t for both self-harm and suicidal behaviors.[7]

83% of young people believe social media companies should be doing more to tackle cyberbullying on their platforms.[8]

60% of young people have witnessed online bullying. Most do not intervene.[9]

Only 1 in 10 teen victims will inform a parent or trusted adult of their abuse.[10]

4 out of 5 students (81%) say they would be more likely to intervene in instances of cyberbullying if they could do it anonymously.[11]

You might be interested in
What is the correct keyboard shortcut to cut a cell value
vladimir2022 [97]

Answer:

Cntrl+X

Explanation:

Do it on your computer

4 0
2 years ago
The presentation ____ determines the formatting characteristics of fonts and colors.
leonid [27]
The presentation theme determines the formatting characteristics of fonts and colors.
6 0
3 years ago
Read 2 more answers
Which of the following is not a type of bank? (Everfi)
Zinaida [17]

Answer

Pay Day Lender

Explanation

A bank is a financial institution which is authorized by the government to accept deposits inform of cash or cheque from the public who are the customers, and it creates a credit. It saves money to for the customers and also provides security for the customers money. It also lends money to the customers as loan where they pay with interest within a given time. There are many types of banks which include credit unions, online banks,industrial, agricultural, retail banks and many others.

3 0
3 years ago
Read 2 more answers
A software or hardware that checks information coming from the Internet and depending on the applied configuration settings eith
photoshop1234 [79]

Answer:

1. Firewall.

2. Router.

3. Proxy.

4. SMTP, 25.

Explanation:

1. A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

Furthermore, firewalls are typically bidirectional, it checks all sent and received data and only allow authorized traffic through.

2. A router can be defined as a network device that is designed typically for forwarding data packets between two or more networks based on a well-defined routing protocol.

A routing protocol refers to a set of defined rules or algorithms used by routers to determine the communication paths unto which data should be exchanged between the source router and destination or host device.

Additionally, in order for packets to be sent to a remote destination, these three parameters must be configured on a host.

I. Default gateway.

II. IP address.

III. Subnet mask.

3. A proxy can be defined as a computer network service designed to avail end users (clients) the ability to connect indirectly to other network services. For example, a reverse proxy is a type of server that is placed right in front of other servers such as a web server and it forwards or routes the user's (client) requests to those servers sitting behind it. When properly configured, reverse proxy helps to ensure security, reliability and performance of a network.

4. A spam filter can be defined as a software program designed to process all incoming electronic messages (e-mails) and prevents any unsolicited or unwanted mail (spam) from entering the inbox of a client.

Generally, a spam filter uses SMTP with port number 25 to carry out its services.

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

3 0
3 years ago
Which is an example of a variable name written in camelcase?
NemiM [27]

Answer:

Option (a) myCar

Explanation:

Option (a) is Correct

If there are two or more words in variable we can use camel case to declare the variable. In camel case first character of first word is either a lowercase alphabet or underscore (_) and first character of second word is a uppercase alphabet. ex: empNum, myCar

So the Option (a) myCar is correct among the given options

Option (b) is incorrect

Since both the first letter of two words are in lower case which is not according to camel case rules

Option (c) is incorrect

The first letter of first word is in lower case first character of second word is a uppercase alphabet but there is a gap so it is not valid .

Option (d) is incorrect

The first word is in upper case and first character of second word is a uppercase alphabet it is not valid.

6 0
3 years ago
Read 2 more answers
Other questions:
  • If you are upgrading your operating system to Windows 7, you may not use the In-Place Upgrade Installation Option with
    14·1 answer
  • Holly Carpenter argues that technology may actually prevent some kinds of evolution that would benefit humans. Do you agree with
    8·2 answers
  • Where is a 3D modeler most likely to work?
    6·1 answer
  • you just bought a new hard drive for your computer .you plan to use this as a secondary hard drive to store alll your files. wha
    15·1 answer
  • NEED BY 15 MINUTES PLEASE! WILL MARK BRAINLIEST!You can create special effects in an image using a camera or a photo-editing too
    5·1 answer
  • What privacy risks do new technologies present,<br> and how do we decide if they're worth it?
    11·1 answer
  • SOMEONE PLEASE HELP ME OUT WITH THIS PLEASE
    13·1 answer
  • Ok so I’m using a word document and towards the bottom of the page it stops me from moving my text box any further down even tho
    13·2 answers
  • Give an example of what Artificial Intelligence application most popular is used on a daily basis.
    12·2 answers
  • What is the difference between a general ai as opposed to a specialized ai?.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!