1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Juli2301 [7.4K]
3 years ago
7

Other side for bullying

Computers and Technology
1 answer:
almond37 [142]3 years ago
4 0
I'm not exactly sure what you mean by this could you elaborate?
You might be interested in
What does a coder do on a daily basis?
Gnoma [55]

medical charts and assinging codes

8 0
3 years ago
Rebecca completed work on a computer and is verifying the functionality of the system when she finds a new problem. This problem
MariettaO [177]

Answer:

a. Report the new problem

Explanation:

Policies are an essential component of any organization and are important because they address pertinent issues.

Reporting the new problem would make it simpler for her and her colleagues who might encounter similar issues. It would also help the management to understand why it happened, assist her, set priorities and prevent recurrences.

3 0
4 years ago
To assign a conditional value, use the ____ function.
zubka84 [21]
<span>To assign a conditional value, use the IFF function.  It is an abbreviation for  Immediate If.  It is a function </span>on spreadsheets that returns the second or third parameter based on the evaluation of the first parameter.  <span>You use </span>IIf<span> to determine if another expression is true or false. If the expression is true, 
</span>IIf<span> returns one value; if it is false, </span>IIf<span> returns another.</span>
3 0
3 years ago
What is an electronic ledger that tracks mathematical data
anyanavicka [17]
Computer or calculater.hope this helps
7 0
3 years ago
Danilo is planning the art to include in a business proposal his team is preparing. For which of the following items should Dani
Flura [38]
<span>A photo he found using an Internet search engine</span>
6 0
3 years ago
Read 2 more answers
Other questions:
  • Which ipsec component is software that handles the tasks of encrypting, authenticating, decrypting, and checking packets?
    10·1 answer
  • What are the two basic steps in communication
    9·1 answer
  • Each warning label must contain this element and its purpose is to provide a visual alert to users to the chemical hazards to wh
    14·2 answers
  • To deny a host from sending HTTP traffic destined to a specific server you will need to apply a __________ Access Control List.
    12·2 answers
  • Is technology uniting or isolating people
    14·2 answers
  • Which devices are most likely to communicate with the internet? Select 3 options.
    13·1 answer
  • Define a method pyramidVolume with double parameters baseLength, baseWidth, and pyramidHeight, that returns as a double the volu
    8·1 answer
  • Priortization is an example of a skill that helps you reach long term goals because
    14·1 answer
  • A(n) ________ address is the address that external entities use when communicating with your network.
    11·1 answer
  • Posts that you delete
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!