1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Citrus2011 [14]
3 years ago
14

The graph shows that sixty-eight percent of students think cyberbullying is a problem. One hundred human stick figures are shown

in 5 rows of 20. The bottom 3 rows and 8 figures in another row are shaded. Based on the information in the graph, which is the best conclusion that can be drawn about cyberbullying? Fewer students are affected by cyberbullying than not affected. All students think that cyberbullying is a problem. More students are affected by cyberbullying than not affected. No students think that cyberbullying is a problem.
Computers and Technology
2 answers:
kari74 [83]3 years ago
8 0

Answer:

C.

More students are affected by cyberbullying than not affected.

Explanation:

I got it correct on Edgenuity 2020.

Stolb23 [73]3 years ago
6 0

Answer:

C

Explanation:

You might be interested in
We have constructed a Player Class for you. Add the following: public static variable: int totalPlayers Static variable should b
Margaret [11]

Answer:

public class Player {

   public static int totalPlayers = 0;

   public static int maxPlayers = 10;  

   public static boolean gameFull() {

       return totalPlayers >= maxPlayers;

   }

   public Player() {         // Player class constructor

       totalPlayers++;

   }

}

Explanation:

The Java program defines the class Player which has two public class variables and a public method. The class constructor increases the totalPlayer variable by one for every player object created.

5 0
3 years ago
What are some of the issues that organizations need to be aware of when designing and managing data?
tensa zangetsu [6.8K]

Answer and Explanation:

There are two primary issues.  

The principal issues is Security of data or information.

The information must be overseen such that it is upheld up regularly and kept secure from any catastrophic event or outer hacking.  

Second, when planning a framework to oversee information, we have to make it versatile and adaptable.

The data should be scalable , i.e., the component used to store the information must be effectively ready to develop as we collect more information or the sort of information contribution to the framework needs to change after some time.

7 0
3 years ago
true or false manual handling of materials accounts for the primary source of energy in the workplace
Rus_ich [418]
True, hope this helps
6 0
3 years ago
Read 2 more answers
What commands would return all the rows and columns in the ProductCategory table?
Delvig [45]

Answer:

Select commands would return all the rows and columns in the table.

Explanation:

In the database management system, it consists of one or more table. To handle this table it provides the concept of SQL(Structured Query Language). It is a programming language that design, manage, store data into the relational database. It is case sensitive language. In the SQL many commands used for handle table data, it returns all rows and columns from the table.

Syntax of select command can be given as:

Select * from tablename;

Example:

select * from ProductCategory;

returns all the data from the table.

In select command, we will also return select data by using condition

SELECT column1 [, column2, ...]

FROM tablename

WHERE condition

In the conditional clause we use these operators that can be given as:

= Equal, > Greater than, < Less than, >= Greater than equal to, <= Less than equal to, != Not equal to.

8 0
3 years ago
Ok so I usually don’t do this but I just need an answer , on Instagram a notification popped up while I was watching someone’s s
statuscvo [17]

Answer:

I think it was about cheaper ads on Instagram and how they are lowering their prices.

Explanation:

6 0
3 years ago
Read 2 more answers
Other questions:
  • Hard drives are usually self-contained, sealed devices. Why must the case for the hard drive remain sealed closed?
    8·1 answer
  • Methods that require you to use an object to call them are called ____ methods.1. accessor
    7·1 answer
  • Grooves and polished surfaces on desert pebbles are most likely caused by
    10·1 answer
  • Hazel has just finished adding pictures to her holiday newsletter. She decides to crop an image. What is cropping an image?
    10·1 answer
  • You are given an integer N, followed by N lines of input (1 &lt;= N &lt;= 100). Each line of input contains one or several words
    8·1 answer
  • Which of the following is NOT part of the URL for an Internet web site?
    13·1 answer
  • What are the two basic classes of active directory objects?
    14·1 answer
  • What is a geam in the ggplot2 system?
    5·1 answer
  • Which actions are available in the Trust Center? Check all that apply.
    8·1 answer
  • Your motherboard has sockets for 184-pin dimm ram. which type of ram should you install?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!