1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BartSMP [9]
3 years ago
14

3. What role can the school play in order to avoid and act against cyber bullying?​

Computers and Technology
1 answer:
Snowcat [4.5K]3 years ago
6 0

Answer:

below

Explanation:

really nothing because you cant prevent cyberbullying in any way its going to happen at anytime anywhere you can act against it by doing a orginazation to try and prevent it.

You might be interested in
When using bits to represent fractions of a number, can you create all possible fractions? Why or why not?
seropon [69]

Explanation:

Using this technique a number is represented in bits by three parts: sign, exponent, and fraction. This is similar to scientific notation used to represent large or small numbers (e.g. ). The sign is negative, the exponent is 8 and the fraction is 0.35.

8 0
3 years ago
What happens when there is a data fail?
Korvikt [17]
Data loss also sets back productivity timelines and can cause you to lose customers if it is accompanied by security breaches
7 0
3 years ago
Read 2 more answers
During an interview, your non-verbal communication (body language, gestures, tone of voice, speed of talking,
kompoz [17]

Answer:

True

Explanation:

People will judge you based upon your non-verbal communication. If your non-verbal communication is bad then you might not get the job.

8 0
4 years ago
On Study Island, What do I do when the numbers don't show up?
mafiozo [28]
Try restarting your laptop
8 0
3 years ago
Read 2 more answers
Bruh why is everyone skipping my question!!!!!!!
DiKsa [7]

Answer:

What is your question?

Explanation:

7 0
3 years ago
Other questions:
  • In the 1960s, techniques were developed that allowed individuals to fool the phone system into providing free access to long dis
    14·1 answer
  • Create a query that will list all technician names, employee numbers, and year hired in order by year hired (Newest to Oldest).
    5·1 answer
  • Which protocol do many browsers assume when you enter a URL in the address field?
    9·1 answer
  • Select the answers that best describe showing respect for confidential data. Check all of the boxes that
    10·1 answer
  • Which of the following correctly shows the general structure of a for-each loop header?for (initialization; condition; increment
    9·1 answer
  • Write code that prints: Ready! numVal ... 2 1 Go! Your code should contain a for loop. Print a newline after each number and aft
    14·1 answer
  • Who is katie and why is she deleting my answers
    7·2 answers
  • With _________, it is easy to target a specific geographic location. Which answer completes the blank in the sentence?
    5·1 answer
  • 9.2.8 last names codehs
    10·1 answer
  • What is the following file format called? inv_nbr, inv_name, inv_cost 876521,battery,45.00
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!