1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Amanda [17]
3 years ago
11

Which is the best response to receiving a threating text from a classmate

Computers and Technology
2 answers:
Ratling [72]3 years ago
6 0
Report it to teach if you feel threatened in anyway, and block the person
Yuri [45]3 years ago
5 0

Answer:

send a threatening text in reply, then block the phone number block the phone number, then contact his phone service provider immediately delete the text, then report the incident to authorities ignore the message, then get a new cell phone number.

Explanation:

You might be interested in
Considering the traffic problem, do you think Rod handled the situation well?
svet-max [94.6K]
No he did not that was a poor choice.
7 0
3 years ago
The science of networking is attributed to which government's involvement?
worty [1.4K]

Answer:

The United States

if I am not mistaken

6 0
3 years ago
In the ISO/IEC 27002 framework, _________________ describes the use and controls related to encryption.
Nezavi [6.7K]

Answer:

In the ISO/IEC 27002 framework, Cryptography describes the use and controls related to encryption, to help an organization implement, maintain, and improve its information security management.

7 0
3 years ago
What naming scheme identifies the rows in a worksheet?
masha68 [24]
The naming scheme that identifies the rows in a worksheet is B. 1, 2, 3.
Rows are horizontal, and they are identified by numbers in an Excel worksheet. On the other hand, columns are vertical, and they are identified by letters in the same Excel worksheet. 
7 0
3 years ago
Read 2 more answers
What is File Allocation Table
vichka [17]
It's how you format your hard drive
4 0
3 years ago
Read 2 more answers
Other questions:
  • Find the Mechanical Advantage and the maximum separation load for a wedge (length = 6 inches and height = 3 inches) used to spli
    12·1 answer
  • How can i appear offline without fb messenger saying "last active 1 minute ago"?
    5·1 answer
  • Which does an icon on the desktop signify?
    12·1 answer
  • What will be the value of ans after the following code has been executed?
    10·2 answers
  • Don is visiting digital stores and searching the internet to learn about high-definition DVD players before he buys one. This is
    8·1 answer
  • How do you respond to an email?
    6·1 answer
  • In computer science how can you define "copyright, designs and patents act 1988"?​
    8·1 answer
  • What are the benefits of writing functions that use parameters and return? Try to list at least two.
    12·1 answer
  • You are required to copy in your attendees' emails from outside of Outlook when creating a meeting
    6·2 answers
  • Criminal investigations are limited to finding data defined in the search ____.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!