1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leto [7]
3 years ago
9

What steps should you take if your harassed online​

Computers and Technology
2 answers:
AURORKA [14]3 years ago
8 0
Tell an adult and report the person harassing you
Yuri [45]3 years ago
6 0
Block them and if ur comfortable, tell ur parents
You might be interested in
Pls help ASAP I’ll brainlest
goldenfox [79]

Answer:

Trash#7519 for discord loser

Explanation:

8 0
3 years ago
What feature does google docs have to allow users to work in a document?​
Pavel [41]

Answer:

Share.

Explanation:

Go to the Share button in the top right corner of the doc, and click it. Then type the email adress of who you want to work on it. (make sure the symbol to the right of the email is a little pencil Icon)

6 0
3 years ago
A. Requiring computer users to log off before leaving for lunch
GuDViN [60]

Answer:

Option A, B, and D.

Explanation:

In the above question, the some details of the question are missing that is the part of the question.

Information Security applies to the mechanisms and techniques built and maintained to secure print, computerized, or any other type of personal, secret and confidential information or records from unauthorized access, usage, exploitation, release, damage, manipulation, or disturbance.

So, the following are the option that is true about the scenario.

Other option is not true about the scenario because Option C the click fraud are not the part or protect from the information security and Option F is not considered to the following scenario.

7 0
4 years ago
Which Cisco IOS command will permit the engineer to modify the current configuration of the switch while it is powered on?
DIA [1.3K]
Configure terminal because Commands in this mode are written to the running configuration file as soon as you enter them (using the Enter key/Carriage Return). After you enter the configure terminal command, the system prompt changes from switch# to switch(config)#, indicating that the switch is in configuration mode.
7 0
3 years ago
How to reply to text from unknown number?
Leto [7]
Safest way: DO NOT reply and BLOCK number.

If you are not sure if the guy is related to some stuff, it will be better to call him back, instead of texting.
5 0
3 years ago
Other questions:
  • how do I comment on answers? there's one answer I'm confused about but I don't know how to comment on it
    7·2 answers
  • The sequence of folders to a file or folder is called a(n) ________
    8·1 answer
  • How do i end my current plan that i never signed up for, the basic one it charged me $24
    11·2 answers
  • Excel recognizes an entry as a value if it is a number or it begins with ____
    8·1 answer
  • What is this effect in photoshop or photography?
    12·2 answers
  • function calculate () { var s = 2; var x = 2; var y = 3; if (x > 4) { s=s+ 2; } else if ( y > 4) { s=s+ 4; } else { s+=3;}
    11·1 answer
  • When operating a forklift, what should you do to ensure a clear view and proper balance when traveling with a load?
    6·2 answers
  • Is it possible to have a deadlock involving only oneprocess? Explain your answer.
    11·1 answer
  • For which of the following values of A and B will the expression A || B be true?
    15·1 answer
  • The formula (Block address) modulo (Number of blocks in the cache) shows the typical method to index a direct-mapped cache. Assu
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!