1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rina8888 [55]
3 years ago
13

If you’re the victim of cyber bullying behavior, besides contacting your teacher or the school, where else can you go to find in

formation?
Computers and Technology
1 answer:
RideAnS [48]3 years ago
3 0

parents

childline

ceop

family

You might be interested in
What is the name of the unique identifier assigned to any personal computer that is connected to the internet?
Stolb23 [73]
There is no truly unique identifier assigned to a PC. Any appearance of a unique ID is merely an illusion. The closest thing there is to a unique identifier is a MAC address, which is actually assigned to a network adapter (Ethernet port, wireless radio, etc.) and is usually unique but can be faked
7 0
3 years ago
Which of the following devices is used to connect multiple devices to a network and sends all traffic to all connected devices?
Stels [109]

Answer: HUB

Explanation:

A Hub is a network device, that acts only in layer 1 (Physical layer) forwarding all traffic that reaches to the input port, to all output ports at once, without processing the received data in any way that could modify them.

It behaves like it were a multiport repeater (which has only one output port).

5 0
3 years ago
You work in an office that uses Linux and Windows servers. The network uses the IP protocol. You are sitting at a Windows workst
Westkost [7]

Answer:

The ping command.

Explanation:

In a network, workstations known as clients, users or nodes are the devices where data is needed or sents from. A server on the other hand, is a device in the network, configured to render a particular service like database, domain name service, web service etc.

When a link from a workstation to a server is down, the workstation looses connection the server. To confirm the connectivity of the link, "ping" the server ip address from the workstation using the command "ping 'server ip address'". This sends echo packets to the server, which is echoed back if there is connectivity.

6 0
3 years ago
What is thesql command to list the total sales by customer , month , and product, with subtotals by customer and by month and a
alexira [117]

Answer:

The answer is below

Explanation:

The the sql command to list the total sales by customer , month , and product, with subtotals by customer and by month and a grand total for all product sales is:

SELECT S.CUS_CODE, T.TM_MONTH, S.P_CODE,

SUM(S.SALE_UNITS*S.SALE_PRICE) AS "TOTSALES"

FROM DWDAYSALESFACT AS S INNER JOIN DWTIME AS T ON S.TM_ID =

T.TM_ID

GROUP BY S.CUS_CODE,T.TM_MONTH,S.P_CODE WITH ROLLUP;

4 0
3 years ago
What are some of the challenges that could arise from setting up a file management system on a computer?
Arisa [49]
It could fail, it would take a long time setting it up and aslo it could be easily hacked.
3 0
3 years ago
Other questions:
  • What output will the look up formula below produce in relation to the following table?
    11·1 answer
  •  When using cost-benefit analysis to determine the benefits of a community project, economists measure the value in terms of (A.
    14·1 answer
  • _____, which are generated by web server software, record a user's actions on a web site. viruses log files junk e-mails worms
    7·1 answer
  • Someone please help me with the right answer please
    13·1 answer
  • Why is it important to minimize cable clutter in a rack?
    11·1 answer
  • How do you bookmark a website in each of the internet browsers?
    9·1 answer
  • What is “public domain” and how is it used?
    7·1 answer
  • A boundary marks the inside and outside of a system and sets the system apart from its environment.
    11·1 answer
  • Which is an appropriate strategy for using a workplace blog?
    9·1 answer
  • Create a program that prompts the user for a positive integer then prints a right-aligned pyramid using that number using the st
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!