1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zzz [600]
3 years ago
14

Do you think it's easier to be mean online than offline? why?

Computers and Technology
1 answer:
netineya [11]3 years ago
4 0

Answer:

Yes because on online we can talk all we want and they don't know us irl so it's funny lol

Explanation:

You might be interested in
There are three required elements needed to connect to the internet: hardware, web browser, and __________.
malfutka [58]

Yes the answer is D.internet service.

7 0
3 years ago
Read 2 more answers
Select the correct answer
Kamila [148]

Answer:

a point at which the user chooses a certain path.

6 0
3 years ago
Read 2 more answers
______ devices are high-performance storage servers that are individually connected to a network to provide storage for the comp
natali 33 [55]
NAS - network attached storage
3 0
4 years ago
So my computer has be clicking random things and opening things. It’s been happening for a few days and I want to know if it’s a
soldi70 [24.7K]

Viruses and malware are common and can have drastically negative results on your computer and life.

You can often tell that your computer is infected because it acts weird or slow.

Active antivirus software is a good way to prevent these problems.

4 0
3 years ago
The best defenses against covert channels include IDS and intrusion prevention system (IPS) and thoroughly watching all aspects
ddd [48]

Answer:

The statement is True

Explanation:

When talking about computer security, we can define covert channels as an attack on a system capable of creating a loophole for information objects transfer between various processes that would normally not allow communication under the computer security policy. Hence, the best defenses system against this kind of attack is via Intrusion Defense System and Intrusion Prevention System and relentlessly "watching all aspects of an IT infrastructure for aberrant or abnormal events of any type."

7 0
3 years ago
Other questions:
  • 535 = d +4<br> Whats d?????????????????????<br> &lt;33 thnx babes.
    8·2 answers
  • What is a record? What is a field? How are they represented in Access?
    8·1 answer
  • What does the term measure refer to in typography
    7·2 answers
  • An
    9·1 answer
  • Nielsen purchases scanner data from retail transactions to track the sales of consumer packaged goods, gathered at the point of
    14·1 answer
  • Write code using the range function to add up the series 20, 30, 40, ... 90 and print the resulting sum each step along the way.
    9·1 answer
  • Identify the selector in the following CSS code:
    10·1 answer
  • After you create a pie chart, you can move it to its own chart sheet.
    9·1 answer
  • HURRY- I’ll give 15 points and brainliest answer!!
    10·2 answers
  • Similarities of ROM and RAM?​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!