1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VladimirAG [237]
3 years ago
12

Which would be a responsible use of technology used by victims of cyberbullying?

Computers and Technology
2 answers:
IrinaVladis [17]3 years ago
5 0

Answer:

Changing password and screen names regularly.

Explanation:

The cyber attacks have been common in this age. The technological advancements have eased our lives but also create hundreds of risks. These risks can include cyber bullying. The best way to keep your self away from being victim of such threat is by changing passwords regularly. This reduces the chance of hacking passwords and cyber bullying.

NISA [10]3 years ago
5 0

Answer:

C

Explanation:

I took the quiz :)

You might be interested in
Is the type of vision useful in sending motion and objects outside normal vision
nlexa [21]
Yes it is in fact it is usful
8 0
3 years ago
Please help ASAP, will mark brainliest!
Nezavi [6.7K]

Answer: The answer would be B.

Explanation:

6 0
3 years ago
Adam is so good at playing arcade games that he will win at every game he plays. One fine day as he was walking on the street, h
ohaa [14]

Answer:

ask it to ur teacher boiiiiii

3 0
2 years ago
If you're working in a table that has three columns and five rows . the first row is the header row i want it to span all three
Ivenika [448]
Select the columns and merge.
3 0
3 years ago
Network footprinting is used to ______________________. Group of answer choices test for vulnerabilities determine what services
Rufina [12.5K]

Answer:

Network footprinting is used to ______________________.

test for vulnerabilities.

Explanation:

Network footprinting is the technique that reveals system vulnerabilities and how the vulnerabilities can be exploited.  Hackers use footprinting to determine the location and objective of a network.  The discovery of this specific information about the organization can lead to the hacking of the network.  Network footprinting relies on loopholes to create vulnerabilities in a network and plans for cyberattack.

3 0
2 years ago
Other questions:
  • A type TW cable containing two No. 12 copper conductors has a maximum overcurrent protection of
    7·2 answers
  • Ben chang noticed that his store was lagging in sales . He realized that his staff was not experienced enough . As the store man
    13·2 answers
  • What type of USB connector is always plugged into the computer to connect in external device
    14·1 answer
  • To aid Android app developers, who must account for multiple screen sizes and resolutions, Android has introduced the ____, whic
    15·1 answer
  • As Alexa types a message, Outlook autosaves the message at various points. In which folder is the message located if Alexa wants
    15·2 answers
  • 1.) A ____ is a piece of information.
    10·1 answer
  • Mkdir() is the command in Java to create a new directory.<br> a) True b) False
    10·1 answer
  • A ___ is an online collaborative event that may include such features as chat, slideshows, and PowerPoint presentations.
    8·1 answer
  • Which option is typically only used when utilizing self joins?
    8·1 answer
  • Which directory stores the cron configuration file?.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!