1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lyrx [107]
4 years ago
6

Samuel loves playing the violin, but he feels embarrassed after a classmate posts a video on a social networking site making fun

of him. What step should Samuel take next to stop the cyberbullying?
1) He should report the incident to the social networking site.
2) He should upload his own video making fun of the classmate.
3) He should convince his friends to cyberbully the classmate.
4) He should add the classmate on his friend’s list and follow him.
Computers and Technology
2 answers:
iogann1982 [59]4 years ago
5 0

Answer: A. He should report the incident to the social networking site.

Explanation:I just took the test have a good day! :)

Ksenya-84 [330]4 years ago
4 0

Answer:

Number 1 would be the answer and most safest one to choose.

You might be interested in
Joshe is a project leader in Tiran technologies. 75 developers and analysts work under his supervision on several projects. Thes
Ivahew [28]

Answer:

Option (b) Presence Information.

Explanation:

Presence Information as the name suggests it includes the report of the employees present in the office at the moment. So, option (b) Presence Information  is the best option available for Joshe as a Project Leader to keep track of the developers and analysts about their presence in the office. This can also be used weather the employees are busy, available or in a meeting or out of office and their availability on working on the project. Option (a) Desktop Sharing doesn't solves the purpose as different employee can share the desktop of a different employee. Option (c) Web Conferencing is not a correct option as it doesn't solves the purpose. Option (d) instant messaging doesn't solves the purpose as if they are busy in a project they might not be able to message instantly and it might be understood as Out Of Office and its not correct option available.  

3 0
3 years ago
In this exercise, first run the code as it is given to see the intended output. Then trace through each of the 3 variables to se
dlinn [17]

Answer:

The memory with variable names str1, str2, and str3 all have equal and the same value after the first if-statement.

Explanation:

The str1 was first assigned a null value while the str2 and str3 were assigned the string value "Karen" with the String class and directly respectively. On the first if-statement, the condition checks if the str1 is null and assigns the value of the variable str2 to str1, then the other conditional statement compares the values of all the string variables.

3 0
3 years ago
What are the example of dedicated computers?
Drupady [299]
A dedicated server is a single computer in a network reserved for serving the needs of the network. For example, some networks require that one computer be set aside to manage communications between all the other computers. A dedicated server could also be a computer that manages printer resources.
8 0
3 years ago
Which of the following is NOT a recommended characteristic for incident objectives?A. Stated in broad terms to allow for flexibi
docker41 [41]

Answer:

A. Stated in broad terms to allow for flexibility.

Explanation:

Incident command are controls or directives needed in production or in an organization. A few characteristics not incident command objectives are, all projects and targets must be measurable and attainable, aii hand on board must function in accordance with the incident commander's authorities, and every finished project must meet company quality standards and deadlines. The incident commander's authorities are fixed for a particular sector and is rigid.

6 0
3 years ago
To open the find and replace dialog box with shortcut keys, hold down ctrl and press ________
ratelena [41]
Hi. To open the find and replace dialog box with shortcut keys, hold down CTRL and press the letter "H". 

Hope this helps.
Take care.
8 0
4 years ago
Other questions:
  • Why is a port scan detected from the same ip on a subnet an alarming alert to receive from yourids?
    5·1 answer
  • What are the 6 external parts of a computer system
    8·1 answer
  • To generate a report with exact results based on specific criteria it is best to base the report on a(n) ____________________ cr
    6·1 answer
  • Which tabs are expandable and collapsible? This would be in word 2010
    6·1 answer
  • When reading words with a scanner object, a word is defined as ____?
    15·1 answer
  • How are codecs related to audio file formats?
    9·1 answer
  • You wish to use a file system that creates a record or log of to-be-committed changes in the system so that if the system crashe
    14·1 answer
  • What symbol shows autocorrect is in use in access? WILL MARK BRAINLIEST FOR WHOEVER ANSWERS FIRST!!!
    5·1 answer
  • It means fruit- trees garden.
    8·1 answer
  • if a college wanted to provide its students with access to a network that could be used in any of the buildings across campus, i
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!