1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BartSMP [9]
3 years ago
14

3. What role can the school play in order to avoid and act against cyber bullying?​

Computers and Technology
1 answer:
Snowcat [4.5K]3 years ago
6 0

Answer:

below

Explanation:

really nothing because you cant prevent cyberbullying in any way its going to happen at anytime anywhere you can act against it by doing a orginazation to try and prevent it.

You might be interested in
the easiest and cheapest time to alter the information system is in the ________ phase of the sdlc. a. requirements analysis b.
nignag [31]
I would think its the "<span>requirements analysis" phase.

Because the </span>requirements analysis<span>,</span><span> is the process of determining user expectations for a new or modified product.</span>
7 0
3 years ago
Explain approaches of AI​
Umnica [9.8K]
A-artificial I-intelligent
5 0
2 years ago
Read 2 more answers
I need help please?!!!
PolarNik [594]

Answer:

Turn on the defroster. obv

Explanation:

7 0
3 years ago
Read 2 more answers
What color line appears under a word that is spelled incorrectly in power point
strojnjashka [21]

Answer:a wavy red line

Explanation:

Hope this helps

Can I have brainliest pls

7 0
3 years ago
Read 2 more answers
I NEED HELP QUICK
Serjik [45]

Answer: keeps confidential documents secure,

displays a GUI, allocates the computer's resources, and retrieves files

Explanation:

The operating system can be defined as the software installed in the system that provides the information and services to the users by controlling the hardware, software resources, and regulates the computer programs. It runs the applications and programs in the system, displays the graphic user interface for the services, stores, manipulates, and retrieves files. It prevents the unauthorized access to the data and programs by using passwords thus provides the security to the system and documents.

8 0
3 years ago
Other questions:
  • The front surface of the CCD is called the _________
    11·1 answer
  • You are configuring a switch that has three hosts attached to FastEthernet 0/2 through 0/4. All three hosts are part of a public
    10·1 answer
  • When users talk about font size,
    10·2 answers
  • If I wished to insert a hyperlink from text in my document to my company website, what type of link would I insert?
    9·1 answer
  • How many pounds must a sand bag weigh to test if a safety net can absorb the proper amount of force? A. 150 lbs. B. 200 lbs. C.
    6·1 answer
  • Will mark brainliest! What does this code do? What kind of code is this called?
    15·1 answer
  • Please help!!! I am very confused about this question!
    10·1 answer
  • The complete process for learning through repetition is to read, write, say, rest and revisit the information. Please select the
    12·2 answers
  • Anyone have any website ideas I could use for my computing website project? Thank you.
    15·2 answers
  • HELP ME PLEASE 41 PTS
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!