1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pavlova-9 [17]
3 years ago
9

Which is a form of cyber bullying??

Computers and Technology
1 answer:
Ivanshal [37]3 years ago
4 0
-Teasing
-Posting embarrassing information about them
-Lying/Rumors
You might be interested in
A power supply unit for a computer converts:
Vinvika [58]
A power supply unit (or PSU) converts mains AC to low-voltage regulated DCpower for the internal components of acomputer. ... Some power supplies have a manual switch for selecting input voltage, while others automatically adapt to the mains voltage.
5 0
3 years ago
What is the reason that a modern electron microscope (TEM) can resolve biological images to the subnanometer level, as opposed t
zhannawk [14.2K]

Answer:

The correct answer to the following question will be "The wavelengths of the electron beams are also much shorter or less than illumination and visible light".

Explanation:

TEM seems to be a methodology of microscopy during which a pulse of electrons is transferred to create the effect through some kind of microscope, could approach biological objects at the sub-nanometer standard, as related to hundreds of nano-meters for either the absolute best microscope with super-resolution.

Also because of the electron beam's distances, they are still much shorter or smaller than daylight and infrared light, meaning that biological objects and artifacts can be resolved.

6 0
3 years ago
Find the gear ratio of the gear in the picture. <br><br> 25 points+brainliest
ankoles [38]

The gear ratios would look like A:B=1:9 and C:D=1:32 if you are just needing the gear teeth ratio. Not a lot of information to go off of from the question though

8 0
3 years ago
Given the function F (X, Y , Z)=Σm(0,1, 2 , 4 , 6)
Mnenie [13.5K]

Answer:

(1)Minterms complement = XYZ (2) Compliment of Minterms = Σm(0,1, 2 , 4 , 6) (3) (X+Y+Z) (4) Minimized SOP = Z + XY

Manterms = πM

Explanation:

Solution

Recall that:

Given the function F (X, Y , Z)=Σm(0,1, 2 , 4 , 6)

(1) Canonical Disjunctive Normal Form: In boolean algebra, the boolean function can be expressed as Canonical Disjunctive form known as minterms

In Minterm we assign 'I' to each uncomplimented variable and '0' to each complemented/complementary variable

For the given question stated we ave the following:

Minterms = XYZ, XYZ, XYZ, XYZ, XYZ.

(2) Canonical Conjunctive Normal Form: In boolean algebra, the boolean function can be expressed as Canonical Disjunctive form known as maxterms.

In Maxterms we assign '0' to each uncomplimented variable and '1' to each complemented/complementary variable

Compliment of Minterms = Σm(0,1, 2 , 4 , 6)

Maxterms = πM

Note: Kindly find an attached copy of the complete solution to this question below.

6 0
3 years ago
In an ipv4 address, what are the maximum number of bits that can be used to identify the network address
Solnce55 [7]
Up to 24 bits can be used to identify unique <span>networks.</span>
5 0
3 years ago
Other questions:
  • Which of the following characters at the beginning of a cell signifies to Excel that it should perform a calculation for the val
    13·1 answer
  • 01010010 01100101 01100001 01101100 00100000 01101101 01110101 01110011 01101001 01100011 00100000 01110100 01101001 01101100 01
    5·2 answers
  • The user can set their own computer hostname and username. Which stage of the hardware lifecycle does this scenario belong to?
    6·1 answer
  • Which hardware component is most suspect if a user can barely make out
    10·1 answer
  • Betrand Meyer developed the ______ programming language which is not type-safe because it violates the law of contravariance.
    9·1 answer
  • C++
    11·2 answers
  • Create an application (that uses the SortedABList) that allows a user to enter a list of countries that he or she has visited an
    11·1 answer
  • Write a method doubleUp that doubles the size of a list of integers by doubling-up each element in the list. Assume there's enou
    13·1 answer
  • (a) List 5 keys we can type with our left hand fingers
    9·1 answer
  • Sarah used a grid to create this layout for a website. Which rule of composition did Sarah use for the grid?
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!