1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
castortr0y [4]
3 years ago
7

List three ways you can help somone who is being cyber bullied instead of just being a bustander​

Computers and Technology
2 answers:
Oksanka [162]3 years ago
8 0

Explanation:

You can listen to the child and let him or her know you are available to talk or even help. A child who is being bullied may struggle talking about it. Consider letting the child know there are other people who can talk with him or her about bullying. In addition, you might consider referring the child to a school counselor, psychologist, or other mental health specialist.

Give the child advice about what he or she can do. You might want to include role-playing and acting out a bullying incident as you guide the child so that the child knows what to do in a real situation.

Follow up with the child to show that you are committed to helping put a stop to the bullying.

JulsSmile [24]3 years ago
4 0
Tell an adult
give them moral support
help them stand up for themselves
You might be interested in
If a fire should break out in your building, which of the following actions is NOT recommended?
quester [9]

C) Scream and run

you need to remain calm and carefully exit the building making sure you have everybody with you

6 0
4 years ago
Read 2 more answers
You can use a server-side script as a ____ to access data from another domain.
Mashcka [7]
I believe the answer your looking for is "Proxy"
0 0
3 years ago
Swiping and pinching are graphical user interface (gui) _____________.
Sergeu [11.5K]
Swiping and pinching are graphical user interface (gui) to zoom in or zoom out.  <span>One of the many multitouch gestures on today's laptops is the ability to </span>pinch<span> two fingers to </span>zoom<span> in and </span>out<span> in a window. </span>
6 0
4 years ago
Read 2 more answers
A metacharacter is a character that has a special meaning assigned to it and is recognized as part of a scripting or programming
nydimaria [60]

Answer:

The answer is "Option a"

Explanation:

Meta-character is a unique character, which is used in the system or information area, that provides information about the other characters. This type of character is used in both command-line and programming.  

  • It has a particular meaning and should be prevented for reasons except for its particular importance.
  • It attempts in the algorithmic technique to view all character as a fundamental ASCII instead of a specific purpose.
3 0
3 years ago
After configuring the role services on the Remote Desktop server, Jabez creates a collection for the Marketing group in the orga
lawyer [7]

The option that  is true is option C: Jabez created a shared folder that is accessible to remote servers in the collection.

<h3>What are servers?</h3>

A server is known to be a form a computer program or device that helps to give a service to a given computer program and its user.

Note that in the case above, The option that  is true is option C: Jabez created a shared folder that is accessible to remote servers in the collection.

Learn more about servers from

brainly.com/question/17062016

#SPJ1

8 0
2 years ago
Other questions:
  • Practice Home Survey
    14·1 answer
  • Teachers in most school districts are paid on a schedule that provides a salary based on their number of years of teaching exper
    7·1 answer
  • The Maui coffee shop sells coffee at $10.50 a pound plus the cost of shipping. Each order ships for $0.86 per pound + $1.50 fixe
    14·1 answer
  • how do i create an advanced search using the search criteria in the range K2:S3 and the inventory data where the results will be
    8·1 answer
  • It is ok to sell services on Xbox in exchange for real-world money
    10·2 answers
  • An experienced user has installed Oracle VM VirtualBox on her workstation and is attempting to use it to create a virtual machin
    6·1 answer
  • URGENT!!! Steve wants to change shooting and exposure settings while on his photo shoot. Which camera part will allow him to do
    12·2 answers
  • Which UML relationships should be used between a subclass and a superclass? For example, suppose there is an interface or abstra
    5·1 answer
  • Sonja is writing a program to compare two numbers and print the larger number. Which of these should be used?
    6·1 answer
  • Is it bad to leave your laptop plugged in all the time
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!