1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Citrus2011 [14]
3 years ago
14

The graph shows that sixty-eight percent of students think cyberbullying is a problem. One hundred human stick figures are shown

in 5 rows of 20. The bottom 3 rows and 8 figures in another row are shaded. Based on the information in the graph, which is the best conclusion that can be drawn about cyberbullying? Fewer students are affected by cyberbullying than not affected. All students think that cyberbullying is a problem. More students are affected by cyberbullying than not affected. No students think that cyberbullying is a problem.
Computers and Technology
2 answers:
kari74 [83]3 years ago
8 0

Answer:

C.

More students are affected by cyberbullying than not affected.

Explanation:

I got it correct on Edgenuity 2020.

Stolb23 [73]3 years ago
6 0

Answer:

C

Explanation:

You might be interested in
Explain the five design principles that cartographers use when designing a map.<br>HELP ASAP
Dovator [93]

Answer:

Five of the main design principles are legibility, visual contrast, figure-ground organization, hierarchical organization, and balance. Together these principles form a system for seeing and understanding the relative importance of the content in the map and on the page.

Explanation:

3 0
4 years ago
An example of an "external brain" is:
mojhsa [17]

<u>Answer:</u>

<em>Organize things </em>

<u>Explanation</u>:

It is the <em>duty and power of external brain to Organize ideas</em>. Per day we may have plenty of works to be done. So we start thinking about <em>one by one and finally we try to sort out and organize how to perform, when to do and what is the first and last task etc. </em>

It is the external brain which is helping us to figure it out. But there are certain times where we <em>dump things together</em>, especially when there is an very important like marriage of our family member, where they <em>give lots of responsibilities. </em>

<em>At that time, we have very limited time to work out things and we dump our external brain. </em>

7 0
3 years ago
Read 2 more answers
What is the best way to use copyrighted material?
Tcecarenko [31]

Answer:

Locate the author and request permission to use the material.

Explanation:

There are different types of copyright though, they may just point you at what type of copyright it has and you need to read it to figure out what you can/can't do with the material.

8 0
3 years ago
Read 2 more answers
You are asked to assume the role of an employee of the DigiFirm Investigation Company. As part of its community outreach effort,
kirill [66]

Answer:

1.  To trace an email we need to examine the header part of the email. By examine the header of an email we could extract the sender, subject and other important credentials related to that email.  

2. The command to trace the email id is “whois” command.

 First open the email client and find the IP address of the received email that need to be traced.  The command “whois” IP address gives the registration information of that IP address.

 3.  Reverse address/email search is the procedure used by the experts to find the origin or the ownership of the email.  Rather than tools websites are more use full in the reverse address search.

http://reverse.addresssearch.com, www.iplocation.net, etc. are good to find the ownership of an email.

4. We need to set up mail server to send, receive and to explore various activities associated with an email.  The other related purpose servers like SMTP server, HTTP server , etc are also required to assist large organizations.  The mail server can be a stand-alone computer or a collection of computer and servers.

 5.  The executable files should be examined thoroughly in the server, it can be dangerous malwares.  The examination is mainly done by scanning for malicious words and sender address.  Since many mail providers does not allow executable files to send, so the attackers are using other files also as a carrier of the malwares, so now every emails should be subject to deep examination using some malware scanner.  

6.   By the time of examination the some of the legitimate mails may also come under the suspect list so further check is needed there.  At the same time the attacks can be from legitimate sources also this could be go un-noticed; this should be also a challenge to face in the stage of e-mail examination.

8 0
3 years ago
Explain how low atmospheric oxygen level affected alligator growth in terms of cellular respiration
geniusboy [140]

Answer: Hyperoxic alligators show significantly lower breathing rates than their siblings in normoxic and hypoxic groups. Conversely, each breath supports greater oxygen consumption in hyperoxic animals than in other groups. Statistical significance between groups was calculated by ANOVA with post hoc Tukey–Kramer

Explanation:

4 0
3 years ago
Other questions:
  • When desktop publishing software can interact with another software program, the two are said to
    6·1 answer
  • What is storage virtualization? Multiple Choice combines networks by splitting the available bandwidth into independent channels
    13·1 answer
  • What 2 major agricultural inventions did jethro tull create?
    10·2 answers
  • What is one reason that writing effective messages is so important
    11·2 answers
  • Write a C++ program to find if a given array of integers is sorted in a descending order. The program should print "SORTED" if t
    14·1 answer
  • What is one reason the number of DUIs has dropped?
    7·1 answer
  • Select which is true for for loop​
    11·1 answer
  • create your own min function that finds the minimum element in a list and use it in a separate function
    14·1 answer
  • Chris needs to modify the default bullets that are used in a nonnumbered list in Word.
    12·2 answers
  • How does one decide which businesses to invest in.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!