1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Citrus2011 [14]
3 years ago
14

In 2009 to 2010, how many social network users were reported as being victims of online abuse?

Computers and Technology
2 answers:
Dafna1 [17]3 years ago
7 0
The answer is B because being victims of online abuse is not important
ddd [48]3 years ago
7 0

Answer:

Answer is A For apex 1 in 10. I don't know where the dude below me got his answer

You might be interested in
Write a program that represents a popular kid’s toy that teaches them about different shapes and colors.
SVEN [57.7K]

Answer:

blue circle

Explanation:

7 0
3 years ago
Which of the following is an advantage of text HTML editors over plain text editors?
zubka84 [21]
C hope that helps have a good day and I feel you good for big hugs
5 0
3 years ago
Read 2 more answers
Write an if/else statement that compares the value of the variables soldYesterday and soldToday, and based upon that comparison
jenyasd209 [6]

Answer:

if(soldYesterday > soldToday){

salesTrend = -1;

} else if(soldToday > soldYesterday){

salesTrend = 1;

}

Explanation:

The if/else statement is more explicit. The first if condition check if soldYesterday is greater than soldToday, if true, then -1 is assigned to salesTrend.

Else if soldToday is greater than soldYesterday, if true, then 1 is assigned to salesTrend.

7 0
3 years ago
An extranet is a restricted network that relies on Internet technologies to provide an Internet-like environment within the comp
DerKrebs [107]

Answer:

A) False

Explanation:

Extranet

An extranet acts as a shared network, disseminating information present on the intranet. That is, if a private intranet shares some of its content with other users (be they sellers, customers, etc.), this shared network is what we call the extranet.

Intranet

Today, companies are looking for tools and methods to align internal communication, reduce costs, and centralize information and files. The intranet is one of these tools, which works restricted to a specific audience, such as a company. This way, collaborators can access it with their specific username and password.

The intranet is, then, a closed and internal network, and still allows the use of more communication protocols besides HTTP. Intranet access is typically done on a local server and a local network, which we call LAN, which means Local Area Network installed within the company.

This internal network connects users, allowing information exchange, file and document management, centralizing communication between users. With this tool, you can quickly and securely and efficiently connect companies and departments.

4 0
3 years ago
Types of antivirus explain them
Veronika [31]

Answer: an antivirus is a type of program designed  to protect computers from  viruses, spyware, botnets, rootkits, keyloggers and such. There are many versions and types of anti-virus programs which can be very helpful.

Such as:

Norton.

Kaspersky.

Ad Aware.

AVG

Mc Afee

Hope this helps u...

Explanation:

3 0
3 years ago
Other questions:
  • What piece of software tells the operating system how to use a specific hardware device? a. User interface b. System service c.
    14·1 answer
  • Why might a variable used for output have to be of a different type then a variable used for input? ​
    12·1 answer
  • What does the clone tile command do?
    15·2 answers
  • Which character is cannot be used in a file name _ (underscore)/ (backslash)- (hyphen) % ( percent)
    12·1 answer
  • Is backing up computer files done on the hard drive?
    14·2 answers
  • 20 POINTS AND BRAINLIEST TO CORRECT ANSWER
    15·2 answers
  • A person who creates a computer virus is a (1)system analyst (2) techician(3) programmer​
    11·2 answers
  • Second Largest, Second Smallest Write a program second.cpp that takes in a sequence of integers, and prints the second largest n
    15·1 answer
  • You can use this keyboard shortcut to toggle the visibility of the command line. If for some reason your command line is hidden
    7·1 answer
  • Owen is writing a program that will lock his computer for one hour if the incorrect password is entered more than five times. Ha
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!