1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Illusion [34]
3 years ago
8

Tricking someone else into sharing private information, then posting it publicly online, is a form of which type of cyberbullyin

g?
Denigration
Exclusion
Outing
Trickery
Computers and Technology
1 answer:
Alisiya [41]3 years ago
5 0
If the bully did not first befriend the person, it’s outing. If he did, then it’s trickery.
You might be interested in
What's ur favorite color and your dream car
alex41 [277]

Answer:

blue and jeep wrangler or a hellcat widebody :)

Explanation:

5 0
3 years ago
Read 2 more answers
Which type of computer operating system would be best for a large corporation?
JulsSmile [24]
C.) Multi-user, multitasking
6 0
3 years ago
Read 2 more answers
g write a recursive function that prints out all the even numbers between x and y inclusive if x is odd then the print out will
Reil [10]

Answer:

The function written in python is as follows:

def EvenNumbers(x, y):

    if (y < x):

         return

    if (y % 2 == 0):

         EvenNumbers(x, y - 2)

    else:

         EvenNumbers(x, y - 1)

    if (y % 2 == 0):

         print(y)

Explanation:

x represents the lower limit while y represents the upper limit.

So, the recursion will be repeated as long as x <= y

This defines the function

def EvenNumbers(x, y):

This checks if y < x. If yes, the recursion stops execution and return to the main

<em>     if (y < x): </em>

<em>          return </em>

The following if and else condition checks determines the appropriate range of the recursion.

<em>     if (y % 2 == 0): </em>

<em>          EvenNumbers(x, y - 2) </em>

<em>     else: </em>

<em>          EvenNumbers(x, y - 1) </em>

The above takes care of printing starting at x + 1 if x is odd

This checks and prints the even numbers in the range

<em>     if (y % 2 == 0): </em>

<em>          print(y)</em>

<em />

To call the function from main, make use of

EvenNumbers(x, y)

Where x and y are integers

e.g EvenNumbers(2,10), EvenNumbers(1,17), EvenNumbers(3,21)

<em>See attachment</em>

3 0
3 years ago
Write a program that reads in ten numbers from the user and displays the distinct numbers. If a number entered by the user appea
Jobisdone [24]

Answer:

Here you go :)

Explanation:

Change this however you'd like:

array = []

for n in range(10):

   x = int(input("Enter integer: "))

   array.append(x)

dup = set(array)

print(", ".join(str(i) for i in dup))

7 0
3 years ago
What represents the loss of a network signal strength measured in decibels (dB) and occurs because the transmissions gradually d
alexandr402 [8]

Answer:

Attenuation is the one-word answer which is the correct answer for the above question.  

Explanation:

Attenuation is a concept which told about the barrier, which is used to stop the signals in the connected network systems. Attenuation can be a form of any type of barrier like weak signals, or because of long-distance.

Following are the example which is in the form of attenuation--

  1. Noise
  2. The distance can also be a problem for weak signals.
  3. Hacker also disestablished the network signals.
  4. The physical objects.

Hence the attenuation can be formed by any of the barriers of signals, like physical obstruction, longer distance, and radio inference.

7 0
3 years ago
Other questions:
  • To operate a vehicle in Florida, you must _____.
    9·2 answers
  • Harry wants to change the background of all of his presentation slides. Which slide will enable him to make this change to all t
    14·1 answer
  • Suppose in a class of 100 students, there is a homework due every week. The professor wants to encourage students to hand in the
    8·1 answer
  • Using-R,-create-a-linear-model-to-represent-the-coefficients-for-the-objects-fw2-and-fwe-data..
    10·1 answer
  • Ip addresses and their corresponding domain names are used to identify computers available through the internet.
    15·1 answer
  • After which stage in the information processing cycle can data be referred for future use?
    7·1 answer
  • Buying what you want rather than what you need is an example of:
    12·1 answer
  • Question 4 (Worth 5 points)
    14·2 answers
  • Join for a pack battle loud microphone.
    10·1 answer
  • Brian needs to see the space available to insert content on a slide in his presentation which feature of the presentation should
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!