1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ElenaW [278]
3 years ago
15

Which of the following does NOT describe the characteristics of cyberbullying?

Computers and Technology
2 answers:
Marrrta [24]3 years ago
6 0

Answer:

Harmless, Discreet

Explanation:

Aleonysh [2.5K]3 years ago
3 0

Answer:

The answer will be Harmless.

Explanation:

Reason being is that cyber-bullying IS VERY HARMFULL!!!!

You might be interested in
Write a program to take in a time-of-day on the command-line as 3 integers representing hours, minutes, and seconds, along with
nexus9112 [7]

Answer:

In Python:

hh = int(input("Hour: ")) * 3600

mm = int(input("Minutes: ")) * 60

ss = int(input("Seconds: "))

seconds = int(input("Additional Seconds: "))

time = hh+ mm + ss + seconds

hh =  int(time/3600)

time = time - hh * 3600

mm = int(time/60)

ss = time - mm * 60

while(hh>24):

   hh = hh - 24

print(str(hh)+" : "+str(mm)+" : "+str(ss))

Explanation:

We start by getting the time of the day. This is done using the next three lines

<em>hh = int(input("Hour: ")) * 3600</em>

<em>mm = int(input("Minutes: ")) * 60</em>

<em>ss = int(input("Seconds: ")) </em>

Then, we get the additional seconds

<em>seconds = int(input("Additional Seconds: "))</em>

The new time is then calculated (in seconds)

<em>time = hh+ mm + ss + seconds</em>

This line extracts the hours from the calculated time (in seconds)

hh =  int(time/3600)

time = time - hh * 3600

This line extracts the minutes from the calculated time (in seconds)

mm = int(time/60)

This line gets the remaining seconds

ss = time - mm * 60

The following iteration ensures that the hour is less than 24

while(hh>24):

   hh = hh - 24

This prints the calculated time

print(str(hh)+" : "+str(mm)+" : "+str(ss))

6 0
3 years ago
Which of the following statements represents a scientific bias?
valina [46]

Answer: Use data from the previous steps because they show better results

Explanation:

A scientific bias occurs when there's a deviation between the observations of a researcher and the accurate representation of data and results.

In this case, the use of data from the previous steps because they show better results will bring about a data bias as it'll lead to inaccuracies of the data being represented.

5 0
3 years ago
If any one answered this i will give brilientst what is stimulation program​
7nadin3 [17]

Explanation:

organized programs of enrichment designed to provide developmentally appropriate activities to babies and toddlers who have, or who are at risk for a variety of conditions (environmentally or biologically caused) that might interfere with their ability to ultimately have a full and productive life."

4 0
3 years ago
I NEED SOME MAJOR HELP W/ THIS!!! PLSSS. WHOEVER HELPS GETS 80 POINTS!!! I NEED IT DONE SOON! TYY &lt;3;)
Oksanka [162]

Answer:

I probably won't awnser them all but I'll try my best

Explanation:

Hacking is a breach of privacy online usually caused by some kind of malware injected into your device there's multiple types of this program or files malware which simply damages and harms your device. A Trojan horse is a program which tricks you by selling you a fake product which has code in it which has code which gives the hacker remote access to your device this program is usually free and masked like a crack or patch of a certain program. U got the second an third question with this one so u can just divide it into pieces. Piracy is Hacking but this time the hacker is stealing ur information through the malware. Invasion of privacy can have multiple forms online and offline. Online intrusion is when a service gives out information you entrust to it while off line Intrusion is stalking trespassing blackmail etc.

4 0
3 years ago
Hey guys im just curious.... whats ur favorite number
Oksana_A [137]

Answer:

13

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • Charles sends Julia text messages every morning insulting her appearance and threatening to hurt her. He writes unflattering des
    5·2 answers
  • System requirements that are important in determining if a software program will work on a computer are ____.
    8·1 answer
  • Technology can most broadly be defined as anything that does which of the following ?
    11·1 answer
  • Which of the following statement is most accurate? A. A reference variable is an object. B. A reference variable refers to an ob
    6·1 answer
  • In 2-3 sentences, explain to another student why shortcuts are beneficial. Include details about shortcuts that you have used.
    10·2 answers
  • "The ______ of an operational system that supports an organization includes policies, requirements, and conditional statements t
    13·1 answer
  • Which staff member takes a set of plans and supervises their construction?
    6·1 answer
  • Which important aspect of the Roman Empire did the barbarians destroy?
    14·2 answers
  • A customer bought a goods for Rs.9,000 after getting 10% discount. Calculate the marked price of the goods.Write in Qbasic.​
    8·2 answers
  • If you want to load the "my-data.csv" file to Dataframe so that you can explore find out the number of data items in the data se
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!