1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Juli2301 [7.4K]
3 years ago
7

Other side for bullying

Computers and Technology
1 answer:
almond37 [142]3 years ago
4 0
I'm not exactly sure what you mean by this could you elaborate?
You might be interested in
Define function print_popcorn_time() with parameter bag_ounces. If bag_ounces is less than 3, print "Too small". If greater than
yawa3891 [41]

Answer:

void print_popcorn_time(int bag_ounces){

   if(bag_ounces < 3){

       cout<<"Too small"<<endl;

   }else if(bag_ounces > 10){

       cout<<"Too large"<<endl;

   }else{

       cout<<(6 * bag_ounces)<<"seconds"<<endl;

   }

}

Explanation:

The function is the block of the statement which performs the special task.

For checking the condition in the program, the if-else statement is used.

It can check the condition one or two but if we want to check the more than two different conditions then the continuous if-else statement is used.

syntax of continuous if else:

if(condition){

statement;

}else if(condition)

statement;

}else{

statement;

}

In the question, there are three conditions;

1. bag_ounces is less than 3

2. bag_ounces greater than 10

3. else part.

we put the condition in the above if-else statement and print the corresponding message.

8 0
3 years ago
Read 2 more answers
In both direct flooding attacks and _____ the use of spoofed source addresses results in response packets being scattered across
Natali5045456 [20]

Answer:

SYN spoofing attacks.    

Explanation:

The Spoofing attack is used to access the personal information it is distributed the  viruses through infected links or file .The spoofing attacks has redistributed the traffic and the flow control in the denial-of-service attacks.

The SYN spoofing attacks is used the spoofed source in the result of giving response to packet The Spoofing attack  is distributed  across the Internet also it is detectable

6 0
3 years ago
What is the main purpose of adding captions to an image or table in Word?
Wittaler [7]

Answer: c

Explanation:

7 0
3 years ago
Why should programmers use a Post Mortem Review?
Zina [86]
The goal of a postmortem is to draw meaningful conclusions to help you learn from your past successes and failures. Despite its grim-sounding name, a postmortem can be an extremely productive method of improving your development practices.
8 0
4 years ago
Which actions changed the look of the following word?
jarptica [38.1K]

Answer:

D

Explanation:

The actions applied to change the look of the word are:

1. It was set to italics. This can be done easily by highlighting the word => press Ctrl + I together on the keyboard.

2. Next is to set to underline. While still highlighted => press Ctrl + U together in the keyboard.

6 0
3 years ago
Read 2 more answers
Other questions:
  • Which file extension indicates a Microsoft Excel document?
    7·1 answer
  • Which of the following statements best reflects the usefulness of commercial digital editing programs?
    7·1 answer
  • Both k-means and k-medoids algorithms can perform effective clustering. (a)Explain the strength and weakness of k-means in compa
    5·1 answer
  • True or false: in order to keep yourself and co workers safe, you must be able to recognize electrical hazards
    8·2 answers
  • Menus are attached to the windows by calling
    15·1 answer
  • Imagine you are the human resource director for a small video game company that employs around 20 coders, managers, artists, etc
    12·1 answer
  • Who wanna be besties
    8·2 answers
  • Julie: 3: 36, 6:72, 9:108....tell me the next 3 ratios * math*
    11·1 answer
  • For each of the innovations below. Decide if it is a computing innovation or not. Part 3 Continued.
    7·1 answer
  • Your client Mr. Smith has requested a reservation at Eleven Madison Park this evening for a party of 2 at 6PM. Unfortunately, th
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!