1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ghella [55]
3 years ago
7

What helped Taylor through her tough time with being bullied

Computers and Technology
1 answer:
marshall27 [118]3 years ago
6 0
There isn’t enough information for us to answer this question
Have a good day :)
You might be interested in
What is the differnces between dark and middle ages of computer?​
noname [10]
The "middle ages" are anything between the collapse of Rome (400 AD) to its re-emergence in Rennaissance Italy (1400). Rennaissance means "rebirth". The "dark ages" are the period in the middle ages which were relatively undocumented. This would definitely include 400 AD to 700 AD, and some extend it to 900 AD.
3 0
3 years ago
How tp access to all tools in ms word
Tresset [83]
Wigga woggga wigggawiggva
8 0
3 years ago
Develop a list of privacy protection features that should be present if a website is serious about protecting privacy. Then, vis
dusya [7]

Answer:

The features that required to protect the privacy should be:

  1. Protection of User name and Password
  2. Protection of Finger print and other bio metric information if collected from user.
  3. Protection of Personnel Information such as contact information, Identity information if collected.
  4. Protection of data shared such as pictures and videos.

Explanation:

Privacy protection is required to different websites that are involved in collection of different information from users such as user name, password, contact information, account information and messengers. These websites could be website of some bank, online mailing platforms, online shopping platform and social media platforms. These all are used to share and gather our personnel information for different purposes. To ensure the protection of user data they signed a document with users at the time of making account.

The above mentioned are the features that should be included in privacy protection of the website. As all mentioned features are personnel for every user and should be protected from hackers.

3 0
3 years ago
A reputable, world-renowned auction house uses blockchain to verify the authenticity of paintings prior to placing them up for s
REY [17]

Answer:

The ledgers are secure, shared, and incorruptible is the correct answer.

6 0
3 years ago
In cell B7, enter a formula without using a function to determine the profit generated at the Downtown location by subtracting t
Archy [21]

Answer & Explanation:

The formula in the cell B7 would be:

"=B5-B6"

And now we will press "Ctrl+C" to copy the formula in the Cell B7. After copying we will select the cell range C7 to D7 and press "Ctrl+V" to paste this formula in the cell C7:D7 and then will press Enter key. Now what we see is results in C7:D7 which we can check in our calculator whether these are corectly calculated or not.

3 0
3 years ago
Other questions:
  • Which presentation software element can you use to create a model diagram with two concentric circles inside a triangle?
    10·2 answers
  • Tommy has hired a marketing company to create a billboard advertisement
    11·2 answers
  • What shooting position is commonly used when hunting with a shotgun?
    14·2 answers
  • A ____ appearing in the main text of a document indicates a footnote or endnote.
    15·1 answer
  • Going to Grad School! In the College of Computing and Software Engineering, we have an option for students to "FastTrack" their
    11·1 answer
  • If the base-10 system stops with the<br> number 9, then why isn't it called<br> base-9?
    15·1 answer
  • Identifies the row and column that forms the cell
    11·1 answer
  • In which of the following phases of filmmaking would a production team be focused on the
    10·2 answers
  • How do you open an application on the macOS?
    11·2 answers
  • How does digital and hybrid computers differ in portability​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!