1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pavlova-9 [17]
3 years ago
9

Which is a form of cyber bullying??

Computers and Technology
1 answer:
Ivanshal [37]3 years ago
4 0
-Teasing
-Posting embarrassing information about them
-Lying/Rumors
You might be interested in
PLEASE HELP WITH THESE QUESTIONS!!!! 19 POINTS!!!!!
Anton [14]
1. C.) Macintosh
2. B.) Semiconductor
3. D.) Microchip
8 0
3 years ago
Read 2 more answers
token is 64 bytes long (the 10-Mbps Ethernet minimum packet size), what is the average wait to receive the token on an idle netw
ikadub [295]

Given that,

Token is 64 bytes long

The average number of stations that the token must pass = 20

We need to calculate the transmission delay for token

Using formula of transmission delay

Transmission\ delay=\dfrac{token\ size}{minimum\ size}

Put the value into the formula

Transmission\ delay=\dfrac{64\ bytes}{10\ Mbps}

Transmission\ delay=\dfrac{64\times8}{10\times10^6}

Transmission\ delay=0.0000512\ sec

Transmission\ delay=5.12\times10^{-5}\ sec

We need to calculate the average wait to receive token on an idle network with 40 stations

Using formula of average wait

\text{average wait to receive token}=\text{average number of stations that the token must pass}\times transmission\ delay

Put the value into the formula

\text{average wait to receive token}=20\times5.12\times10^{-5}

\text{average wait to receive token}= 0.001024\ sec

\text{average wait to receive token}= 1.024\ ms

Hence, The average wait to receive token on an idle network with 40 stations is 1.024 ms.

8 0
4 years ago
Send a newsletter when you want to communicate directions, advice, or information.
lilavasa [31]
True, since you do want to give out information
4 0
3 years ago
Read 2 more answers
(2) Design pseudocode for a program that accepts numbers from the user until the special number 555 is entered (you should use a
elena-s [515]

Answer:

Pseudocode is explained below

Explanation:

# Create a variable to count the numbers.

numberOfNumbers = 0

# Create a variable to store the sum of numbers.

sumOfNumbers = 0

# Create a constant to store the special numbers.

constant specialNumber = 222

# Start the loop.

while True:

{

   # Prompt the user to enter a number.

   num = input("Enter a number: ")

   # Break the loop if the number is

   # equal to the special number.

   if num == 222:

   {    

       break

   }

   

   # Otherwise, add the number in the current

   # sum and increment the number of values.

   else:

   {

       sumOfNumbers = sumOfNumbers + num

       numberOfNumbers = numberOfNumbers + 1

   }

}

# Display the values.

print("The number of numbers = ", numberOfNumbers)

print("The sum of numbers = ", sumOfNumbers)

7 0
3 years ago
What operating system allows various teams in its office to network and collaborate on projects
Nataliya [291]
It depends what youre doing. If youre doing a collab project you could use mac, windows, or linux. But the basis and best option is Windows Professional 64bit.
5 0
3 years ago
Other questions:
  • When computers are connected and operate through one main computer, it is called a _________ network
    14·2 answers
  • Trading your bicycle for a snowboard exemplifies ?
    15·1 answer
  • A sonar operator on a battleship looks at a display that contains a spatial layout of the distribution of echoes from the surrou
    6·1 answer
  • Refer to the image below. The letter item indicated at 3. is_____________________ a Your Address - Where you are b The Letter Ad
    7·1 answer
  • Convert 42DB5000 base 16 to base 10 floating point form assuming this is a signed floating point encoding (IEEE754) (32-Bit)
    10·1 answer
  • Universal containers regularly imports Accounts from an external order system that has its own ID field for each record.What sho
    8·1 answer
  • Difference between second and third generation of computer<br>​
    14·1 answer
  • Please help ASAP !!!
    15·1 answer
  • If you are to enhance the ICT used by your teachers, how will ypu do it? Will you use the same ICT or will you modify how it was
    11·1 answer
  • (isc)² certified information systems security professional official study guide 6th editionauthors: stewart, james michael; chap
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!