1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fed [463]
2 years ago
11

Please tell fast plzzzzzzzz​

Computers and Technology
2 answers:
NemiM [27]2 years ago
7 0

Answer:

Cyberbullying is the use of digital-communication tools (such as the Internet and cell phones) to make another person feel angry, sad, or scared, usually again and again.

Elodia [21]2 years ago
4 0

Answer:

the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.

You might be interested in
What three characteristics of a function are described in an IPO chart? What is performed at each characteristic?
Blizzard [7]

Answer:

Input

Processing

Output

Explanation:

6 0
3 years ago
Let's play Silly Sentences!
Mrac [35]

Answer:

Grace sat quietly in a stinky stadium with her blue jacket

Grace jumped on a plane to Paris.

Grace ate bananas, apples, and guavas quietly while she listened to the news.

Grace is the name of a major character in my favorite novel

Grace was looking so beautiful as she walked to the podium majestically.

Grace looked on angrily at the blue-faced policeman who blocked her way.

3 0
3 years ago
Cómo se hacían antes las cosas que hoy en día se hacen apoyadas en aplicaciones y software?
KatRina [158]

Answer:

Las cosas que hoy en día se hacen apoyadas en aplicaciones y el software se hacían de manera manual, artesanal o empírica, es decir, antes del avenimiento de la era digital, las tareas que hoy se han automatizado o informatizado se realizaban de forma analógica, mediante procesos con una participación humana mucho más fuerte.

Así, por ejemplo, en el entrenamiento, la medición de variables por parte de los entrenadores respecto de los atletas era procesada de forma manual: la comparación de las distintas estadísticas era recopilada en formato físico, y analizada en forma personal por profesionales idóneos para tal tarea, mientras que hoy en día esa tarea se ha automatizado y es llevada a cabo por programas informáticos específicos.

A su vez, respecto de la tecnología, por ejemplo, el análisis de las variables de mercado y la subida o bajada de distintos valores era sistemáticamente analizada en forma manual, mientras hoy en día diversos programas permiten realizar un análisis técnico y financiero en forma digital.

6 0
3 years ago
In case of a suspected data breach, what course of action should a chief information security officer (CISO) take
guapka [62]

Answer

1. Assemble his team

2. Find reason for breach

3. Evaluate what was lost

4. Ensure password change

Explanation:

In case of a suspected breach, the Chief information security officer should first of all assemble his incidence response team. This team should have representatives from all areas of the organization.

Then the reason for the breach and how access was gained has to be found out. An evaluation of what has been lost in the breach would be carried out and it's likely impact on the company.

In case credentials were stolen the CISO has to ensure that the employees change passwords. Also he has to notify all the necessary parties about the breach.

The CISO has to ensure that all employees are trained properly on security and they comply to security policies.

7 0
3 years ago
Anil needs to show the overlap of people who live in a certain neighborhood in his city and who support a specific political can
pantera1 [17]

Since Anil needs to show the overlap of people who live in a certain neighborhood in his city that supports a specific political candidate, the type of conceptual diagram which he should use is a: B: Venn diagram.

<h3>What is a Venn diagram?</h3>

A Venn diagram can be defined as a circular graphical (visual) tool that is typically used for representing, logically comparing and contrasting two (2) or more finite sets of data such as objects, students, events, voters, concepts, people, etc.

In this context, we can reasonably infer and logically deduce that a Venn diagram is a type of conceptual diagram which can be used by Anil in illustrating the overlap of people who are living in a certain neighborhood in his city and supports a specific political candidate in an election.

Read more on Venn diagram here: brainly.com/question/24581814

#SPJ1

8 0
11 months ago
Other questions:
  • The groups_per_user function receives a dictionary, which contains group names with the list of users. Users can belong to multi
    11·1 answer
  • Discuss the differences between dimensionality reduction based on aggregation and dimensionality reduction based on techniques su
    13·1 answer
  • Given the following code fragment, what is the data type of roster[9] .name? struct student { string name; double gpa; }; studen
    5·1 answer
  • How are different types of cars similar and different?
    10·1 answer
  • An ethernet switch has a ____ table which is updated by ______.
    14·1 answer
  • Explain one way in which programmers may get hired.
    9·1 answer
  • Se numeşte permutare a unei mulţimi finite orice rearanjare a tuturor elementelor acelei mulţimi.
    14·1 answer
  • What can be done to solve unemployment problem?​
    11·1 answer
  • Which type of computer serves as the heart of the computing systems for many, perhaps most, major corporations and government ag
    12·1 answer
  • What option in the zone aging/scavenging properties dialog box will prevent dns record time stamps from being updated too often?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!