1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sonja [21]
3 years ago
15

Chris accidentally steps on another student’s foot in the hallway. He apologizes, but the other student does not want to hear it

and starts calling him names. Chris walks away, but later that day, he starts receiving threatening text messages. After a few days of receiving these texts, he begins to feel scared and anxious.
What steps should Chris take to stop the cyber bully?
Help Me Please
Computers and Technology
2 answers:
aniked [119]3 years ago
7 0
By maybe telling the principal, block the number, and delete it.
Rudik [331]3 years ago
4 0

Answer:

Chris should report the cyber bully to an adult he trusts. Then, he should try to block the text messages by calling his phone provider. Last, he should continue to use technology responsibly by not replying or retaliating.

Explanation: sample response on edgenuity

You might be interested in
What is an aptitude assessment that matches students with study programs at specific colleges and universities?
melisa1 [442]
I think the correct answer would be FOCUS2. It is a system that guides members in choosing college or a major. It provides a starting point for students who are not yet certain of what they want to take academically. Hope this helps.
5 0
3 years ago
Read 2 more answers
What do we call exceptions to the exclusive rights of copyright law?
Studentka2010 [4]

Answer:

Fair use

Explanation:

I don't know if this is correct but Its the best option.

4 0
3 years ago
Each server on a network that needs to act as a web server needs an application layer software package called a (n) ____________
vovangra [49]
I believe the answer is in the question, web server. although I may be wrong
3 0
3 years ago
Create a web page for a fictitious company: Widgets Inc. has hired you to make a mock-up for their new website. They are on a bu
lina2011 [118]

Answer:

.20%

Explanation:

4 0
3 years ago
Write a recursive function to compute sum of first N integers starting with 1.
Citrus2011 [14]

Answer:

// here is code in C++.

#include <bits/stdc++.h>

using namespace std;

// recursive function to find sum from 1 to n

int recur_Sum(int n)

{ // base condition

if (n <= 1)

 return n;

// recursive call

return n + recur_Sum(n - 1);

}

// main function

int main()

{

   // variables

   int n;

   cout<<"Enter a number:";

   // read the number

   cin>>n;

   // print the sum

   cout<<"Sum of first "<<n<<" integer from 1 to "<<n<<" is:"<<recur_Sum(n);

return 0;

}

Explanation:

Read a number from user and assign it to variable "n".Call function recur_Sum() with parameter "n".This function will recursively call itself and find the Sum of first n numbers from 1 to n.Then function will return the sum.

Output:

Enter a number:10

Sum of first 10 integer from 1 to 10 is:55

4 0
3 years ago
Other questions:
  • An electronic resume is a plain-looking document. True of False?
    6·2 answers
  • Write a program that uses a 2-D array to store the highest and lowest temperatures for each month of the year. The program shoul
    14·1 answer
  • which student organization helps students with career development by having them become interms to sponsor conferences?
    9·1 answer
  • What is a new ransomware program that encrypts your personal files and demands payment for the files' decryption keys? Multiple
    10·1 answer
  • Sam needs to create a spreadsheet for his coworkers. They will need to follow a crossed a long road of data. Sam would like to m
    15·1 answer
  • ____ is the dubious practice of registering a domain name and then trying to sell the name for big bucks to the person, company,
    5·2 answers
  • Pls answer i will give 20 points
    7·1 answer
  • Does anybody have the answer for 2.19.6 checkerboard for codehs??
    9·1 answer
  • A network administrator wants to authenticate server machines using Transport Layer Security (TLS). What can the administrator i
    15·1 answer
  • In which ways can governments manipulate the media? Select 3 options.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!