1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arlecino [84]
3 years ago
14

What is cyberbullying?

Computers and Technology
2 answers:
igomit [66]3 years ago
8 0
Cyberbullying is basically bullying over the cybernetic world, over social media and the internet. Victims might not know who is bullying them.
Nutka1998 [239]3 years ago
6 0
Cyberbullying is bullying other people over the internet/
You might be interested in
Each wireless network has its own name to identify it, known as service set identity. true false
Dominik [7]
True. The acronym for service set identity is SSID, which you've likely saw before. And like you say, it's simply the unique name given to a wireless network so that we are able to identify what network we are connecting to.
8 0
3 years ago
Give four characteristics of hard disk​
Lubov Fominskaja [6]

Answer:

1. Mass Storage Devices

2. Available Storage Space

3. Data Access Performance

4. Device Form Factor and Connection

3 0
3 years ago
List 2 advantages Cryptocurrency have over regular bank transactions
ratelena [41]

Answer:

low transaction fees and speedier processing

Explanation:

5 0
2 years ago
Read 2 more answers
.............. 1010111 needs to be transferred w.ith odd parity and the answer is
notsponge [240]

Answer:

A. 01010111

Explanation:

This is because in odd parity, the number on the far left (the 8th number) would always be a 0

7 0
2 years ago
Read 2 more answers
What does it mena when they say "all germs are germs"
KiRa [710]

Answer:it means that germs are germs germs are reproductive they split apart from one another to create more germs.

Explanation:

7 0
3 years ago
Other questions:
  • Assume that the classes listed in the Java Quick Reference have been imported where appropriate.
    14·1 answer
  • How can you differentiate between standard and protocol? Write at least on example of each of these terminologies?
    12·1 answer
  • 1. Which of the following should NOT be in a tagline?
    12·1 answer
  • landon starts his computer and gets message, hard drive is not found. He was watching a movie the previous night, what might the
    6·1 answer
  • Which is a common problem for inserting pictures into placeholders?
    10·1 answer
  • Which of the following electronic payments is ideal for micropayments?
    11·2 answers
  • Your company just installed a new web server within your DMZ. You have been asked to open up the port for secure web browsing on
    5·1 answer
  • Why Use LinkedIn AI Automation Tools to Grow Your Sales Pipeline?
    7·1 answer
  • 100 POINTS!!!!!!!
    15·2 answers
  • T/F static development is the process of constructing the programs and code modules that serve as the building blocks of the inf
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!