1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arlecino [84]
3 years ago
14

What is cyberbullying?

Computers and Technology
2 answers:
igomit [66]3 years ago
8 0
Cyberbullying is basically bullying over the cybernetic world, over social media and the internet. Victims might not know who is bullying them.
Nutka1998 [239]3 years ago
6 0
Cyberbullying is bullying other people over the internet/
You might be interested in
Why are wiki's not secure​
Nookie1986 [14]
Wikipedia is not a reliable source for citations elsewhere on Wikipedia. Because, as a user-generated source, it can be edited by anyone at any time, any information it contains at a particular time could be vandalism
7 0
2 years ago
What is communication​
IgorLugansk [536]

Answer:

it is when u talk to someone

6 0
3 years ago
Read 2 more answers
A _______ contains several blades of differing thicknesses and is used to measure the clearance between parts.
motikmotik
A Feeler Gauge. It is a tool used to measure gap widths
3 0
3 years ago
In order to be compliant with the NIST publications, policies must include key security control requirements. One of these key r
rodikova [14]

Answer:

The answer is "Option A".

Explanation:

A comprehensive collection of principles, guidelines, proposals, and studies on information and information systems privacy and safety are produced and carried out in the NIST publications.

  • The FIPS management standards for federal information and security laws contain various technical reporting sequences.
  • This process takes place after a plan is identified, reviews are carried out and risk analysis is performed.
8 0
3 years ago
The term unauthorized access is a synonym for hacking. <br><br> a. True <br><br> b. False
natita [175]
The answer is True. Hacking is synonymous with unauthorized access most especially when it is intentional. Unauthorized access is defined as illegally gaining access to a file on a computer. It is the same as accessing a network or system without the permission of the owner.
8 0
3 years ago
Other questions:
  • To add text to a blank slide layout, _____.
    8·2 answers
  • Anderson uses his computer and internet link to chart the movement of his favorite 46 stocks. He buys and sells according to the
    15·1 answer
  • When you collaborate or meet with a person or group online, it is called
    12·2 answers
  • Why is Linux widespread in academic environments?
    7·1 answer
  • If the algorithm does not have instructions for unanticipated results, the computer program will a. solve a problem b. start ove
    6·1 answer
  • While reviewing system logs, a security analyst notices that a large number of end users are changing their passwords four times
    13·1 answer
  • Problem: Mr. James Reid, the director of admissions at MOGCHS University, has
    14·1 answer
  • Assume we are using the simple model for floating-point representation as given in this book (the representation uses a 14-bit f
    7·1 answer
  • Why does a computer need memory​
    15·2 answers
  • What's the difference between joystick and mouse​
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!