1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Citrus2011 [14]
3 years ago
14

In 2009 to 2010, how many social network users were reported as being victims of online abuse?

Computers and Technology
2 answers:
Dafna1 [17]3 years ago
7 0
The answer is B because being victims of online abuse is not important
ddd [48]3 years ago
7 0

Answer:

Answer is A For apex 1 in 10. I don't know where the dude below me got his answer

You might be interested in
Which answer would it be?
tigry1 [53]
<h2>My Answer:</h2>

FTP: The definition on Wikipedia is; "The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer files between a client and server on a computer network."

So, if the question is asking for technology that provides a method for two computers hooked to the internet transfer files back and forth between each other, so if we can sum it up the answer which makes the most sense is <em>FTP</em>.

~TheExpertNerd

3 0
3 years ago
Write a small program basic c++, that defines a negative integer (between ‐1 and ‐255), converts it to a positive value and then
ANEK [815]

Answer:

#include <iostream>

using namespace std;

int main() {

int a=-156;//negative integer between -1 and -255.

a*=-1;//multiplying a to -1 so that it can become positive.

cout<<a;//printing a.

return 0;

}

Explanation:

The above written program is in C++ and in the program an integer a is defined with a negative value in the program it is -156.Then to convert it to positive integer we have to multiply a to -1 after that printing the value of a on the screen.

4 0
3 years ago
Within the manufacturing industry, there are fourteen subindustries. Which of the
inna [77]

Answer: A or B i done this before but my memorys quite blurry i rekon doing A

Explanation:

3 0
2 years ago
Set the Append Only property to _____ to allow users to add data to a Long Text field but not to change or remove existing data.
diamong [38]

A computer data storage is made of many features. Set the Append Only property to YES to allow users to add data to a Long Text field but not to change or remove existing data.

  • Append-only is known to be a characteristic or component of computer data storage. It is where new data can be appended to the storage, but where existing data is said to be immutable.

A field's data type is very essential property as it shows what kind of data the field can store.

Learn more from

brainly.com/question/24795103

7 0
3 years ago
Data hiding, which means that critical data stored inside the object is protected from code outside the object, is accomplished
algol [13]

Answer:

Option (D) using the private access specifier on the class fields

Explanation:

  • The private access modifier can be used to hide the data.
  • Methods and data variables ( fields ) can be declared with the private access modifier.
  • Data hiding is a OOPS Concept which can be achieved with the private keyword (private access modifier).
  • The access modifiers are of types Public, Private, Protected and Default ( no access modifier - no need to explicitly specify the default keyword).
  • Data hiding means to hide the data, the data is contained in the class variables.So, option (d) using private access modifier on the class fields is correct option.
  • Option (A) is wrong as the using the public access modifier doesn't hide anything. It is public and is visible to the public.
  • Option (B) is wrong as using the private access modifier on the methods means it is hiding the implementation of the methods not the data.
  • Option (C) is wrong as using private access modifiers on class definition means making the classes not visible to other classes it doesn't mean data hiding as the data is contained in the class variables.
7 0
3 years ago
Other questions:
  • Which of the following can you use to add a picture to your presentation?
    14·1 answer
  • Marissa, a 21-year-old young woman, is working as an intern at a software company. She has recently graduated from college. She
    6·1 answer
  • Page No.
    10·1 answer
  • To determine the average of a range of numbers, click the ____ in the formula bar, then click average.
    13·1 answer
  • In the Programming Process which of the following is not involved in defining what the program is to do:_____________ Group of a
    10·1 answer
  • You are a desktop administrator for nutex corporation. Your organization uses ethernet cable to connect network resources. A use
    14·1 answer
  • An IT suspects that an unauthorized device is connected to a wireless network. This is a result of passkey sharing on a device b
    14·1 answer
  • What term is commonly used to refer to HTML formatting?
    5·1 answer
  • If you have questions about taxes, where can you go to get answers?
    14·1 answer
  • On a leading-trailing system technician A says that both shoes do equal work when stopping while going in reverse. Technician B
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!