1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Citrus2011 [14]
3 years ago
14

In 2009 to 2010, how many social network users were reported as being victims of online abuse?

Computers and Technology
2 answers:
Dafna1 [17]3 years ago
7 0
The answer is B because being victims of online abuse is not important
ddd [48]3 years ago
7 0

Answer:

Answer is A For apex 1 in 10. I don't know where the dude below me got his answer

You might be interested in
If you wanted to make certain numbers in a spreadsheet stand out, you should _____.
almond37 [142]
Make the numbers in bold and/or underlined
3 0
3 years ago
Read 2 more answers
The cafeteria offers a discount card for sale that entitles you, during a certain period, to a free meal whenever you have bough
melomori [17]

Answer:

Explanation:

The algorithm can be described as follows

The first process is to ensure that the constraints for the time at which the offers begin is well defined.

TIME1 = 14:00

TIME2 = 16:00

TIME3 = 18:00

Then, decide the final number of meal following the free meal that has been offered.

NUMBER_OF_MEALS=4;

Then; decide the prices attached to the meal at regular times.

PRICE = 200;

At regular mode, decide the prices attached to the meal and as well as when the offer time commences.

PRICE_OFFER = 160;

Then ask the client(i.e the user) to put in the value required for the number of meals they desire to order.

Input values in n

Suppose (the value exceeds 8)

Then proceed to enquire from the client if they wish to go for the offer.

If not, use the regular price for the order.

Assume the client asks if the offer is a good one to bid for.

You are to show then the analysis of the calculation.

regular = 8 × PRICE

offer = 8 × PRICE_OFFER

profit = regular - offer

Finally, show the profit to the client which will let them know if it is good to bid for it or not.

8 0
3 years ago
We can harden a host by: a. Limiting physical access to it b. Turning off unnecessary services c. Installing patches d. All of t
Rina8888 [55]

Answer:

D

Explanation:

All three of A, B and C are required to harden a host. Thus, All of the above makes the best option.

Hardening simply refers to making your data impossible to be penetrated. More like bulletproof.

To do this, ensure measures like

- Regular Program cleanup

- Patches management

- service pack installation

- service or usage policies

...among others.

Cheers

3 0
3 years ago
Object-Oriented Programming (Using Java Language)
Delicious77 [7]

Answer:

import java.util.Scanner;

class Main {  

 public static void main(String args[]) {

       Scanner scan = new Scanner(System.in);

       System.out.print("Enter a decimal value (0 to 15): ");

       int num = scan.nextInt();

       scan.close();

       

       if (num < 0 || num >15) {

           System.out.printf("%d is an invalid input\n", num);

       } else {

           System.out.printf("The hex value is %X\n", num);

       }

 }

}

Explanation:

Hopefully this example will get you going for the other assignments.

3 0
2 years ago
Fungsi radio adalah..?
malfutka [58]

Answer:

lebih lanjut bahwa radio mempunyai fungsi sebagaimana media- media lain yaitu memberikan informasi/to inform, memberikan pendidikan/to educate, memberikan hiburan/to intertain, fungsi memengaruhi/to influence, dan fungsi pengawasan to control.

<h2>translate;</h2>

Furthermore, radio has a function like other media, namely to provide information/to inform, provide education/to educate, provide entertainment/to intertain, function to influence/to influence, and control function to contact.

Explanation:

8 0
2 years ago
Other questions:
  • To remove an embedded chart, you should _____ it and press the DELETE key.
    14·2 answers
  • Properly defined the primary part of a CPU​
    5·1 answer
  • You can access various sites on the WWW by using hyperlinks or by
    14·1 answer
  • Define an I/O port. Which functions are performed by it?
    10·1 answer
  • For what kind of shot is a fisheye lens most appropriate?
    8·1 answer
  • Identify a stressor in your life. Conduct an internet search to locate at least two reliable sources of information on effective
    6·1 answer
  • Jon wants to assign a value to the favorite food variable: favoriteFood! = "Pizza" but gets an error message. What does he need
    9·2 answers
  • Help Me<br><br> What are the four types of graphic models?
    10·1 answer
  • 2
    5·1 answer
  • Mavis is considering signing up for a hosted enterprise software solution for her small business. She recognizes that an advanta
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!