1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fed [463]
3 years ago
11

Please tell fast plzzzzzzzz​

Computers and Technology
2 answers:
NemiM [27]3 years ago
7 0

Answer:

Cyberbullying is the use of digital-communication tools (such as the Internet and cell phones) to make another person feel angry, sad, or scared, usually again and again.

Elodia [21]3 years ago
4 0

Answer:

the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.

You might be interested in
Which of the following functions of Information Security Management seeks to dictate certain behavior within the organization th
Dmitriy789 [7]

Answer:

The correct answer to the following question will be Option B (Policy).

Explanation:

  • The Policy is a systematic set of rules for driving policies and obtaining rational results. It is a declaration of intent and is applied as a process or protocol.
  • Policies are usually implemented by the governing body throughout the corporation.
  • It was the feature of Information assurance management, which sought to dictate those activities throughout the organization via a collection of institutional requirements.

Therefore, Option B is the right answer.

7 0
3 years ago
How many binary digits are in 10^100.
Basile [38]

Answer:

333 binary digits.

Explanation:

8 0
2 years ago
The science of networking is attributed to which government's involvement?
worty [1.4K]

Answer:

The United States

if I am not mistaken

6 0
3 years ago
What three files do you need to perform a mail merge?<br><br> HELP ASAP PLEASE!!
Burka [1]

The 3 files you need to have for a successful mail merge are:

  • An Excel spreadsheet works
  • Outlook Contact List.
  • Apple Contacts List or Text file, etc.

<h3>What is Mail Merge?</h3>

This is known to be the act of carrying out  a Mail Merge and it is one where a person will need to use a Word document and a recipient list, that is an Excel workbook.

Files needed are:

  • Text file,
  • address files, etc.

The 3 files you need to have for a successful mail merge are:

An Excel spreadsheet worksOutlook Contact List.

Apple Contacts List or Text file, etc.

Learn more about mail merge from

brainly.com/question/20904639

#SPJ1

4 0
2 years ago
The sales management team requires that the Lead Source field of the Lead record be populated when a Lead is converted. What wou
Sav [38]

Answer: A. Validation rule

Explanation:

Validation rules can be used to ensure that fields are populated because they can verify if the data being inputted meet the requirements of the administrators by returning a 'True' or 'False' response after testing. If the result is false, the user will be unable to move on until they adjust the field.

For example, Field length checks on websites are a Validation rule where you are only allowed to input a set number of characters and anything less or more will be denied, such as in the case of inputting phone numbers.

By including a Validation Rule that the LeadSource field of the Lead record be populated when a Lead is converted, the developer will be able to make sure that a user populates the Lead Source field prior to converting a Lead.

5 0
3 years ago
Other questions:
  • Given main(), define the Team class (in file Team.java). For class method getWinPercentage(), the formula is:teamWins / (teamWin
    15·1 answer
  • A technology _____ begins with the birth of a new technology and ends when that technology reaches its limits and dies as it is
    13·1 answer
  • Suppose you have two arrays of ints, arr1 and arr2, each containing ints that are sorted in ascending order. Write a static meth
    7·1 answer
  • Some files appear dimmed in one of the default folders on your computer. What would be the best course of action? A. Leave the f
    5·1 answer
  • I want to know why almost every single "expert answer verified" thing I come across is wrong. If it's wrong, why the h is it exp
    8·2 answers
  • Which of these are correctly formatted Python tuples? CHECK ALL THAT APPY.
    15·2 answers
  • A list is a collection that ______________
    9·1 answer
  • In the second example with modulus math, why can't Eve find the solution?
    10·1 answer
  • How is primary storage different from secondary storage? Select the TWO correct statements. The CPU can only read and write data
    12·2 answers
  • O How basic blocks are identified and how the blocks are used to construct control flow graphs
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!