1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fed [463]
2 years ago
11

Please tell fast plzzzzzzzz​

Computers and Technology
2 answers:
NemiM [27]2 years ago
7 0

Answer:

Cyberbullying is the use of digital-communication tools (such as the Internet and cell phones) to make another person feel angry, sad, or scared, usually again and again.

Elodia [21]2 years ago
4 0

Answer:

the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.

You might be interested in
Which of the following is true about STEM education? STEM education is focused on understanding rather than applying scientific
Soloha48 [4]

Answer:

C). STEM students are encouraged to blend and expand their knowledge of all four subject areas.

Explanation:

STEM education is characterized as a learning and development approach that focuses upon an amalgamation of four subject areas including science(S), technology(T), engineering(E), and Mathematics(M). Thus, each letter stands for a subject domain and this integration of four subjects primarily aims to 'blend and expand the knowledge of the students in these areas' integratively. It helps in developing and sustaining the interests of young learners through this integrated approach which also assists them with unique opportunities. Thus, <u>option C</u> is the correct answer.

5 0
3 years ago
12While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The change
AfilCa [17]

Answer:

Issue the reload command without saving the running configuration.

Explanation:

5 0
3 years ago
Filtering of packets as they leave the network destined for the internet is called ____________ .
e-lub [12.9K]
<span>Filtering of packets as they leave the network destined for the internet is called packet filtering. This firewall technique is also known as static filtering, and it is mainly used to control network access through the process of monitoring both outgoing and incoming packets. Along with monitoring, it functions to allow the packets to pass or halt which takes place based on the source of Internet Protocol.</span>
6 0
3 years ago
A Function checkMe takes three parameters, a character and two integers. If the sum of the two integers is negative, and the cha
Paul [167]

Answer:

Check the explanation

Explanation:

Here is the program with function definition and two sample calls.

Code:

#include <iostream>

using namespace std;

//checkMe FUNCTION which takes values a, b and c

void checkMe(char &a, int &b, int &c)

{

//if sum of b and c is negative and a is 'n', b and c are set to 0, otherwise a is set to 'p'

if((b+c)<0 && a=='n')

{

b = 0;

c = 0;

}

else

{

a = 'p';

}

}

int main()

{

//first test case when else part is executed

char a = 'n';

int b = 5;

int c = 6;

 

checkMe(a, b, c);

 

cout<<a<<" "<<b<<" "<<c<<endl;

 

//second test case when if part is executed

a = 'n';

b = -4;

c = -5;

 

checkMe(a, b, c);

 

cout<<a<<" "<<b<<" "<<c<<endl;

return 0;

}

Kindly check the Output below:

7 0
2 years ago
The communications standard used to transfer pages on the Web is called _____.
andrezito [222]
Hypertext Transfer Protocol (HTTP)
5 0
3 years ago
Other questions:
  • A ________ allows users to add, remove, or edit its content.
    10·2 answers
  • Mobile phones that function as credit cards are called _____.
    11·1 answer
  • #Write a function called hide_and_seek. The function should #have no parameters and return no value; instead, when #called, it s
    7·1 answer
  • When a security professional is presented with a contract drawn up by a company's legal department, which allows them to "hack"
    13·1 answer
  • What is the output of the following program?
    5·1 answer
  • Write a recursive function that returns 1 if an array of size n is in sorted order and 0 otherwise. Note: If array a stores 3, 6
    13·1 answer
  • What do you call a commercial transaction beyween a buisness and buisness thatis transactedd online?
    7·1 answer
  • Explain the history of America ​
    14·2 answers
  • In a relational database, information is organized into tables in which each row represents a(n ) ________. Group of answer choi
    6·1 answer
  • Do anyone know how to code like I need someone do a code for me?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!