1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aniked [119]
2 years ago
6

i was playing a mobile game and I was a guild leader in there. one of the members were very disrespectful and they just left bec

ause of a minor conflict. I tried to talk to them but they decided to delete me from their friend list and changed their name so I couldn't find them anymore. but I somehow figured their new name out and I found out that the person joined my guild in another account. how i should I take revenge?
Computers and Technology
2 answers:
xxMikexx [17]2 years ago
8 0
I suggesr you report them. They will surely be banned( if there is an evidence of course)
Sonbull [250]2 years ago
3 0

Answer:

which mobile game? Whatever the worst thing you can do is. If its slurs and harassment or bullying report them

Explanation:

You might be interested in
If you wish to install a new OS without disturbing the old one so that you can boot to either OS, what type of boot setup should
aleksley [76]

There are different kinds of installations of system software. If you wish to install a new OS, the type of boot setup that one should create a dual.

A dual boot, or multiboot when used, allows one to be able to install a new OS without hindering the activity of the old one, so that one can boot to either OS.

Multi-booting is simply known as the process whereby a person installs multiple operating systems on a single computer, and being able to choose which one to boot.

Dual-booting is a very common configuration that is known to all. It pertains to two operating systems.  

See full question below

If you wish to install a new OS without disturbing the old one so that you can boot to either OS, what type of boot setup should you create?

dual

cross

controlled

Learn more about dual boot from

brainly.com/question/13483046

7 0
2 years ago
The author of ""Cyber-psychopathy: What Goes On in a Hacker’s Head"" states that a crucial component of computer hacking lies in
slega [8]

Answer: The statement implies that the hackers psychologically manipulate the human to access the information they need.

Explanation: The author states that the hacker does not only exploits technology to get system access or to gather information. But there is another pivotal part of hacking. He refers to this part as "social engineering".

Social engineering from information security perspective means manipulate human emotions and convincing them to disclose some confidential information. Hacker often hacks or defrauds after gaining confidence and trust of a person.

Phishing is an example. It is a fraudulent technique for getting some secret information. Phisher sends an email pretending to be from some reputable organization to persuade people to divulge private information like passwords and credit card numbers, ATM card pin etc.

5 0
3 years ago
What is not true of efs
Lemur [1.5K]

Answer:

EFS cannot store files encrypted.

Explanation:

EFS) is a feature introduced in version 3.0 of NTFS that provides filesystem-level encryption. EFS is useful for mobile computer users, whose computer are subject to physical theft, and for storing highly sensitive data. Encryption itself is the method where the information is converted into secret code that hides the information's true meaning. (EFS) is used to encrypt files and folders. EFS is easy to use, with nothing more than a check box in a file’s properties. It is not fully supported on Windows 7 Starter, Windows 7 Home Basic, and Windows 7 Home Premium!

3 0
3 years ago
Easy coding question, please help.
borishaifa [10]

Answers:

What is the index of the last element in the array? stArr1.length()-1

This prints the names in order. How would I print every other value? Change line 4 to: index = index +2

Change line 7 to: i < names.length

5 0
2 years ago
The open items on your computer are displayed here. menu bar open bar taskbar toolbar
Dennis_Churaev [7]
Maybe the answer is the Taskbar?
8 0
3 years ago
Read 2 more answers
Other questions:
  • Given num_rows and num_cols, print a list of all seats in a theater. Rows are numbered, columns lettered, as in 1A or 3E. Print
    7·1 answer
  • An sObject named Application _c has a lookup relationship to another sObject named Position_c.
    12·1 answer
  • To move up one paragraph, press the ____ key(s). f1 alt up arrow up arrow ctrl up arrow
    8·1 answer
  • Tom is very curious as to whether terrorism is truly linked to levels of religiosity around the world. As such, he gathers data
    15·1 answer
  • Check my work a(n) ________ reference is an automatically created variable that holds the address of an object and passes it to
    15·1 answer
  • Which option is referred to by the Reports Due tag?
    7·1 answer
  • 13) An-Excel-file-is-generally called-a-l-an:
    6·1 answer
  • Name TanushSAVAGE. As given in the picture, Subscribe!
    15·1 answer
  • Answer to this problem
    11·1 answer
  • I need help 50 points and brainiest if you answer
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!