1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Citrus2011 [14]
3 years ago
14

In 2009 to 2010, how many social network users were reported as being victims of online abuse?

Computers and Technology
2 answers:
Dafna1 [17]3 years ago
7 0
The answer is B because being victims of online abuse is not important
ddd [48]3 years ago
7 0

Answer:

Answer is A For apex 1 in 10. I don't know where the dude below me got his answer

You might be interested in
A malicious actor is preparing a script to run with an excel spreadsheet as soon as the target opens the file. the script includ
professor190 [17]

Thay is the malicious actor accomplishing this task is done by using the VBA code.

<h3>What is The Visual Basic button?</h3>

It opens the Visual Basic Editor, in which you create and edit VBA code. Another button at the Developer tab in Word and Excel is the Record Macro button, which robotically generates VBA code that could reproduce the moves which you carry out withinside the application.

To run VBA withinside the “Microsoft Visual Basic for Applications” window, you could simply press “F5” key button or click on the “Run” icon withinside the toolbar.

Read more about the spreadsheet :

brainly.com/question/26919847

#SPJ1

5 0
2 years ago
How can the function anotherFunc2 change the contents of the second element of t?
weeeeeb [17]

Answer:

a)change t[1].

Explanation:

The array stores elements in serial order.It keeps an index associated to every element of the array and the indexing start form 0 to size-1.So to access the second element in the array it's index will be 1.So to access the second element we have to write arrayname[1];

In our case the array name is t.

So t[1];

Hence the answer is change t[1];

5 0
3 years ago
What will be the output of “AAAAMMMMMHHHVV” using a file compression technique?
stiks02 [169]

I think AAAAMMMMMHHVVV

i think suppose to be 3 v's

3 0
3 years ago
Read 2 more answers
When an object is selected, it is surrounded by ________, which allow you to change the size of the object.?
boyakko [2]
Matter. because matter surrounds us all and helps us move and change. 
6 0
3 years ago
Javier develops sophisticated fashion websites. He has been asked by the owner of a leading fashion brand to create web content
saul85 [17]

Answer:

hyperlinks

Explanation:

Javier should use hyperlinks to show the users the possible choices for their clothing.  This is really a terrible question and not likely in any real world scenario.  Fashion is always forward thinking and on the cutting edge.  When was the last time you went to a fashion website and were left with only choices to click on a hyperlink?  As Tim Gun would say "Make it work."  If I were able I would include a hyperlink using the previous sentence as the clickable link with a URL reference to

https : //en.wikipedia.org/wiki/Tim_Gunn (spaces after https to make this link not get censored)

to illustrate the way to show that hyperlinks have no real application on modern fashion website.  But they would have great utility here inside the answers section.  But they also are cause for a securtity concern and may be killed by the moderators

7 0
3 years ago
Other questions:
  • What key combination in excel takes you back to the first cell
    7·1 answer
  • PLEASE HELP ME ON THIS..............PLEASEEEEEEEEEEEE PLEASEEEEEE<br><br> ITTS EASYYYYYYYY
    12·1 answer
  • __________%of the users have left websites in frustration due to poor navigation.
    13·1 answer
  • What emphasizes extensive user involvement in the rapid and evolutionary construction of working prototypes of a system to accel
    15·1 answer
  • What is a single-user computer?
    8·1 answer
  • Whats a field in databases?
    5·1 answer
  • Holly the Hacker has a list of 100,000 common passwords. She wants to use this list to break into UNIX-like systems that use a p
    14·1 answer
  • Disadvantages of a grain crusher
    15·1 answer
  • Below functions flatten the nested list of integers (List[List[int]]) into a single list and remove duplicates by leaving only t
    15·1 answer
  • 1.1 give five (5) reasons why modeling is an important part of system analysis and design
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!