1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olga nikolaevna [1]
3 years ago
6

What are possible challenges for cyber bullying

Computers and Technology
2 answers:
IgorC [24]3 years ago
7 0

Answer:

1. they falsely believes he or she cannot control what is posted on his or her social networking site or who sends messages to him or her.

2. they  feel uncomfortable telling you what someone else wrote on your their wall because the comment is inappropriate. Therefore your they fears you may be disappointed in him or her.

3. they feels powerless to deal with cyberbullying

Anestetic [448]3 years ago
6 0

Answer:

well, you will have your account deleted/ arrested because of cyber bullying

Explanation:

so don't!!! (hint hint XD)

You might be interested in
No Browsing History While using the browser on your tablet, you realize that it is not keeping a history of websites you have vi
My name is Ann [436]

Answer & Explanation:

No Browsing History:

  • Your browser is probably set to incognito mode, change it to general mode.
  • space set on your drive to save the content from your browser might be completely filled, Make sure you have given your browser enough space on your drive to save contents.
  • The number of days to record the history in your browser is set to 0, Check the settings and make sure it is not set to 0.

Phishing Scam

  • Change all the credentials on the site that you have disclosed.
  • Immediately report the mail to an IT department and necessary authorities.
  • Mark the mail as span and block the mail id.

Suspicious File Attachment

  • May be that the suspicious file contains a virus file. Often such viruses are attached to external "Show-case" files so that the victim is not able to identify them. Once the external file is tried to open, the virus slips into the main memory (your RAM) and start executing in the background, creating copies of itself and executing every copy. Soon they start eating up the main memory (The memory that runs all your programs) making your PC slow to respond.

Antivirus Software Outdated

  • Connected to the Internet and update the antivirus.

Laptop's Physical Security

  • Set a password.
  • install a tracking software.
4 0
3 years ago
100 POINTS!!!!!!!
bogdanovich [222]

A)

<u>~</u><u>Intellectual property needs to be protected because it usually has</u><u> </u><u>psychological</u><u> </u><u>value.</u>

Hope this helped you- have a good day bro cya)

4 0
3 years ago
Read 2 more answers
1. Which of these is NOT true about Torsion Bars? A. They can be used to adjust Ride Height B. They can be adjusted anytime sinc
Strike441 [17]

My answer is B: They can be adjusted anytime since they don't affect alignment angles.

Option A is correct. Manufactures can change the Torsion bar to adjust the ride height. This is done to compensate the engine weight. Option C is  correct. The torsion’s bar acquires a twisting motion on one end of the suspension, and is firmly fixed to the car’s frame at the other end. Actually, it attaches to the lower control ARM and a cross member key on the chassis frame. Option D is also correct. When a wheel passes over a bump, the Torsion bar acquires a twisting motion on one end of an object whose other end is fixed.


7 0
3 years ago
Reggie has hired you to design a home network. The home network will share a printer but will mainly be used to stream movies to
SIZIF [17.4K]

Answer:

i think the answer is a

Explanation:

3 0
3 years ago
What is the function below Missing?
Nat2105 [25]

Answer:

I think a closing bracket.. sorry if its wrong.

Explanation:

3 0
3 years ago
Read 2 more answers
Other questions:
  • What file formats can you safely use in a video presentation
    14·1 answer
  • To extend the bottom border of a hyperlink across the complete width of a navigation list, change the ____ property of each hype
    9·1 answer
  • Whats the agenda for annual general meeting ??
    10·1 answer
  • How does a hard drive work?
    5·1 answer
  • Discuss the 21 st century competencies or skills required in the information society and 4 ways you can apply it during supporte
    6·1 answer
  • Name three output devices
    6·1 answer
  • What is cloud computing?
    9·1 answer
  • To be fluent in computer language you must learn 8000 __________? (9 letter word)
    5·1 answer
  • 16. The Nintendo Entertainment System (NES) saw its sales skyrocket as a result of the launch of which of the following games?
    14·1 answer
  • What is an important theme in "Once Upon a Time"?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!