1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rasek [7]
4 years ago
15

Where are some places that cyberbullying occurs? Check all that apply.

Computers and Technology
1 answer:
aliya0001 [1]4 years ago
7 0

Answer:

in text messages, on websites, on social media networks and in chat rooms.

Explanation:

If it was just bully it would be all of them but because it is cyber which means computers, technology and virtual reality it is only the online options

You might be interested in
How fast can the winds blow in a tornado?
sp2606 [1]
Over 200 mph generally now I says 300 mph
6 0
4 years ago
Read 2 more answers
1-5 Safety measures in the use of kitchen tools and equipment.​
gladu [14]

Answer:

Safety measures are as follows;

Explanation:

  • Hold the delicate instruments cautiously to use them.
  • Require appropriate use of the equipment in the kitchen.
  • Users should remove these defective instruments or discard of them.
  • During and before use, check that perhaps the resources that will be used are indeed safe.
  • In a cold and dry spot, all equipment must be kept.
4 0
3 years ago
What is life all about?
zloy xaker [14]
Life can be about anything........
8 0
3 years ago
Read 2 more answers
Identify the tasks that people can perform using a web browser. View a web page Program a computer Record a video Organize the e
padilas [110]

Answer:

1,3,5,6,7,8 on edge2020

Explanation:

7 0
3 years ago
Read 2 more answers
Write pseudocode to solve the following problem: You are given an array A[1 . . . n] whose each element is a point of the plane
bixtya [17]

Answer:

Answer explained below

Explanation:

void bubbleSort(int X[], int Y[], int n)

{

   int i, j;

   for (i = 0; i < n-1; i++)      

     

   // Last i elements are already in place

   for (j = 0; j < n-i-1; j++)

       if (X[j] > X[j+1])

{

swap(X[j],X[j+1])

swap(Y[j],Y[j+1]);

}

       if (X[j] == X[j+1]&&Y[j]<Y[j+1])

{

swap(X[j],X[j+1])

swap(Y[j],Y[j+1]);

}

}

Since the above algorithm contains 2 nested loops over n.

So, it is O(n^2)

5 0
4 years ago
Other questions:
  • Business Risks are ​
    15·1 answer
  • Among the many DTP software tools available today, which is regarded as the industry standard for DTP?
    13·2 answers
  • What is the primary reason that organizations change their structure through downsizing, outsourcing, and offshoring as a means
    14·1 answer
  • The use of public wireless connections can increase a user's vulnerability to monitoring and compromise. ____________ software c
    14·1 answer
  • If a menu item requires additional information from the user, the Windows standard is to place a(n) ____ at the end of the capti
    12·1 answer
  • ____ is a consistent relational database state in which every foreign key value also exists as a primary key value.​ a. ​ Refere
    11·1 answer
  • Wireshark is an example of what type of utility? A) Packet sniffer B) Port scanner C) Vulnerability scanner D) Content filter
    11·1 answer
  • Two or more computers connected together is referred to as a(n)
    14·1 answer
  • In a relational database, the three basic operations used to develop useful sets of data are:_________.
    14·1 answer
  • Explain the relationship between one’s point of view and understanding spoken text
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!