1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fudgin [204]
3 years ago
10

Which category best represents: a student sends harassing emails to another student. The receiving student retaliates with a "fl

aming email." Both students start posting on each others' social media wall. A. illegal file sharing B. software pirating C. cyber bullying D. identity theft E. it's just not right or responsible.
Computers and Technology
2 answers:
Mekhanik [1.2K]3 years ago
5 0
C. Cyber bulling, "flaming e-mail" refers to an insulting or hostile interaction. 

Dima020 [189]3 years ago
3 0
It is considered C. cyber bullying
You might be interested in
9.A major step before taking print of the document is (3 points)
olya-2409 [2.1K]

Answer:

Uhyuuuuufuddirueueurururururru

8 0
2 years ago
When I click on someone who asked a question and i want to see there answer it is always blurred and when I asked a question I c
yuradex [85]

Answer:

If your on pc like me use ad blocker I do that but otherwise watch the add press ok after if it dosemt work tell me I’ll try and find you it and for ad blocker you also can have a jailbreak divice and to get and blocker go to chrome extension website search up pop up ad blocker

Explanation:

7 0
2 years ago
How do i answer a qestion on brainly
viva [34]

Answer:

Click on an answer, then click "Add Answer +(?)"

Explanation:

This way you'll be able to add a question to any brainly question that you are able to add a question to. Such as this one. You will receive half the points that the person asking the question assigned to the question, with the minimum being 10 points. After this you will receive those points and be able to write a response much like this one allowing you and 1 other person to answer the same question and received thanks and or brainliest by which the user asking the question can give out to the person who they believe gave the best answer.

Hope this helps! <3

5 0
2 years ago
How can security professionals use software to recover stolen laptops ?
inna [77]

<u>Answer is:</u>

E). They monitor email traffic.

<u>Explanation:</u>


Track Your Device's IP Address with mail. If your laptop or smartphone was stolen, you can use a service like mail to find the IP address of your thief. When you log into those services from any computer, it logs the IP address used, and displays your last used IP in your account. So, these are source for finding the stolen laptop and smartphones.

I hope you got the idea. Thanks

3 0
3 years ago
Discuss the five challenges that limit the use of computer in remote places in Africa​
Alchen [17]

The first challenge is that there is not electric conection.So the computer won't be able to function.Also there will be noone who will be able to use it due to the lack of education.Plus there will not be internet connection , limitting the abilities of the computer to the very basics.In addition there will not be any tools or spare parts in order to fix a computer.Finally even if thete were spare parts there woul not be someone able to gix the computer.

I hop I was helpful.Let me know if you need anything else.

3 0
3 years ago
Other questions:
  • Computer hardware had been designed to run a single operating system and a single app, leaving computers vastly underutilized. o
    15·1 answer
  • When called upon to give an impromptu speech, it is a good idea to do all of the following, except:
    11·2 answers
  • 3. What type of error is in the following sentence? "George W. Bush is the President of the United States of
    5·1 answer
  • 1) In your own words, explain what a browser is. 2) Why is it important to keep your browser up to date?
    12·1 answer
  • A pair of single quotes ' will prevent the shell from interpreting any special character. True or False
    15·1 answer
  • What is another term for accountability?
    7·2 answers
  • 6. You and your friends take an awesome selfie, and you add your name and addresses to the picture. It is a good idea to share t
    11·1 answer
  • During the data transmission there are chances that the data bits in the frame might get corrupted. This will require the sender
    8·1 answer
  • How does an extranet work?
    15·1 answer
  • Write a program that takes a string as an input. If the string entered is equal to
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!