1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
emmainna [20.7K]
3 years ago
11

Online arguments that progressively escalate into insults and harsh language where the bully threatens and tries to intimidate a

nother person is known as:
A.
Deception
B.
Damaging Reputations
C.
Impersonation
D.
Flame Wars
Computers and Technology
2 answers:
9966 [12]3 years ago
8 0
█ Explanation <span>█

</span><span>An online argument that progressively escalate into insults and harsh language where the bully threatens and tries to intimidate another person is known as a flame war.

Answer: Choice D

</span><span>Hope that helps! ★ <span>If you have further questions about this question or need more help, feel free to comment below or leave me a PM. -UnicornFudge aka Nadia </span></span>
Ipatiy [6.2K]3 years ago
3 0
The Correct And Most Logical Answer your looking for is D)Flame Wars
You might be interested in
Universal Containers requires that all users add at least one Product Option from the Maintenance Feature to a bundle.
zmey [24]

Answer

Set the Max Options for “Maintenance” to be one. Set the Min Options to one & Max Options to two for “Support”.

Explanation:

the Admin set up these requirements for the user using Set the Max Options for “Maintenance” to be one. Set the Min Options to one & Max Options to two for “Support”. Since users must select at least one and no more than two Product Options from the Support Feature and Product Option from the Maintenance Feature to a bundle.

6 0
3 years ago
While performing maintenance work on the components of a computer, you feel a small electric shock. Before you began working, yo
Colt1911 [192]
Static electricity could have build up because of your clothes
6 0
4 years ago
Installing unauthorized hardware such as a communication software and modem Select one: a. Is a common practice and does not aff
Alisiya [41]

Answer:

b. May introduce the potential for a security breach using a backdoor programmed into software

Explanation:

muchos malware dedicados al robo de datos son encriptados dentro de codigos que simulan aplicaciones de mensajería, diseñadas para parecerse a programas originales, muchas personas, sin el entrenamiento necesario, no notarían la diferencia, y por desconocimiento instalarían software peligroso.

las empresas, para cuidar el estado de la red, las computadores y los datos que manejan, adquieren softwares de fuentes confiables y verificadas por lo que hacer uso unicamente de estas aplicaciones autorizadas es la manera de mantener segura la red informática de la empresa.

7 0
4 years ago
Select the answer that best descibes what an opportunity cost is
TiliK225 [7]

Answer:

C.What you gain as a result of choosing one option versus another;a benefit.

Explanation:

6 0
3 years ago
Gloria is adding footers to a PowerPoint template for students to use in a literature class. Each student must choose an author
sleet_krkn [62]

Answer:

Its D

Explanation:

On edg

4 0
3 years ago
Read 2 more answers
Other questions:
  • A peer-to-peer (p2p) network is an example of ________ administration
    5·1 answer
  • Which three skills are useful for success in any career?
    8·1 answer
  • What is the best way to show a complex data chart in word?
    6·1 answer
  • _______________ is the use of IT in communication. a) email b) Chatting c) FTP d) All of the above
    7·1 answer
  • Animation timing is does not affect the
    10·1 answer
  • Most sources consider the ARPA-NET project the birth of computer blank<br> .
    11·2 answers
  • If I write too much for an exam answer, do I get downgraded?
    7·1 answer
  • Select all that apply.<br> What two things can you do to display the entire contents of a cell?
    12·1 answer
  • if you put a drone on the charger at 8:12 and take a break at 10:03 how long is it on the charger. for
    7·1 answer
  • He was called "The father of computing c_______ B_______​
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!