1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lubasha [3.4K]
3 years ago
7

Which is the best response to receiving a threatening text from a classmate? send a threatening text in reply, then block the ph

one number block the phone number, then contact his phone service provider immediately delete the text, then report the incident to authorities ignore the message, then get a new cell phone number
Computers and Technology
2 answers:
wlad13 [49]3 years ago
3 0

report the incident immediately to authorities is the best response to that situation.

jek_recluse [69]3 years ago
3 0

Answer:

report the incident to authorities

Explanation:

When you are receiving a threatening text message from a classmate you need to report that to the authorities, not only school authorities but also other kinds of authorities, like police or even getting a restraint order depending on the severity of the threats that he is making, and to search for thebest way to protect youself.

You might be interested in
Howard is leading a project to commission a new information system that will be used by a federal government agency. He is worki
Ann [662]

Answer:

The correct answer is A.

Explanation:

Given the example in the question, Howard is at the step of implementing security controls.

There are five official steps for the risk management framework.

  1. Categorizing The Information System: In this step, the IT system's objectives are assigned based on the current mission or project.
  2. Selecting Security Controls: After the risk assesment is done, the security controls for technical, hardware and software problems are decided according to the outcome.
  3. Implementing Security Controls: In this step, the points that were decided in the step before are put into action.
  4. Authorizing The Information System: Authorization for the risk management is approved and monitored.
  5. Monitoring Security Controls: The authorities keep monitoring the process and makes any necessary changes and updates.

The process that is explained in the question is step 3, which is given in option A.

I hope this answer helps.

5 0
3 years ago
Which tab is used to insert a hyperlink onto a slide?
babunello [35]

the answer is C. Insert

3 0
3 years ago
after clicking the start button on your computer screen desktop what option would you then select to examine system components y
Len [333]
Start>hover over "Computer">right-click>Properties>shows system specs

Start>Control Panel>lets you modify network connections, change time and date, update, uninstall programs, add new hardware, etc.
7 0
3 years ago
HELP 10 POINTS
Masja [62]

Answer:

it's A:state the role each member played in the project

6 0
3 years ago
A decrease in the Short-Run Aggregate Supply Curve is associated with what?
hodyreva [135]
A shift Down,I guess......
3 0
3 years ago
Other questions:
  • Does Logarithms and Algorithms same things?
    6·1 answer
  • When you are shopping online and finalizing your order, you usually fill in forms for your name, address, email, and payment met
    6·1 answer
  • A network administrator issues the show vlan brief command while troubleshooting a user support ticket. What output will be disp
    15·2 answers
  • Identify the false statement.
    8·1 answer
  • Give a logical expression with variables p,q, and r that is true if p and q are false and r is true and is otherwise false.
    5·1 answer
  • My name Jeff <br><br> what movie is this off of
    6·2 answers
  • Translation of a file into a coded format that occupies less space than the original file is called
    15·1 answer
  • In which client/server relationship can a computer act as both a client AND a server? Select one: a. X-Windows b. SSH c. Classic
    8·1 answer
  • Combining two or more cells to make one is called​
    8·1 answer
  • Which of the following tools helps ensure your document will open in older versions of word
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!