1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ziro4ka [17]
4 years ago
9

Which type of evidence should victims collect to help officials catch cyber bullies

Computers and Technology
2 answers:
ANTONII [103]4 years ago
6 0

Answer:

(c)social media usernames

Explanation:

iren [92.7K]4 years ago
3 0

Answer:

How you get cyberbullied just look away from the screen -Tyler The Creator

Explanation:

You might be interested in
Select the answer that best describes the ethical guideline followed in each scenario.
Montano1993 [528]
We need the scenario to solve this feel free to comment on this with your so scenarios and I will provide you with answers or just post another question
4 0
3 years ago
17. Ano ang tawag sa pahina ng Excel?
kompoz [17]

D

Explanation:

D.spread sheet

........,,............:-)

5 0
3 years ago
List four reasons of meaningful use that demonstrate the capabilities and processes required for the provider to show active use
Naily [24]

<span>1.       </span>Improve quality of care and reduce health disparities.

<span>2.       </span>Read the orders in the medical record and make sure to read it back again to verify accuracy.

<span>3.       </span>Maintain the security and privacy of patient health information.

<span>4.       </span>Talk to the patients and families in management of their health care.






7 0
4 years ago
How has the information revolution changed the nature of work and the economy?
Gala2k [10]

It has shifted the economy toward the production of knowledge and services.

7 0
4 years ago
What is % in programming?
Over [174]
% is a module that divides two numbers.
8 0
3 years ago
Read 2 more answers
Other questions:
  • A. STOP: What is a technology habit you practice today that you now realize will not help you to be successful? Explain why it’s
    10·2 answers
  • In what country have regulators demanded that facebook stop collecting biometric data on its users?
    10·1 answer
  • C2.5 - A group of four pirates has a treasure chest and one unique lock and key for each pirate. Using hardware that is probably
    6·1 answer
  • In 2004, ICQ users were enticed by a sales message from a supposed anti-virus vendor. On the vendor's site, a small program call
    15·1 answer
  • The process of sending ping requests to a series of devices or to the entire range of networked devices is called a:
    9·1 answer
  • Write a Python function called simulate_observations. It should take no arguments, and it should return an array of 7 numbers. E
    7·1 answer
  • What is the output of the following program segment? int main() { int num = 5; cout &lt;&lt; num &lt;&lt;" "; change(num); cout
    8·1 answer
  • What does the opacity effect do
    8·2 answers
  • What is copycat <br> i don't know it
    9·2 answers
  • 6) Which of the following an OPERATING SYSTEM? a) Window 7 b) excel c) PowerPoint d) Publisher​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!