1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Illusion [34]
3 years ago
8

Tricking someone else into sharing private information, then posting it publicly online, is a form of which type of cyberbullyin

g?
Denigration
Exclusion
Outing
Trickery
Computers and Technology
1 answer:
Alisiya [41]3 years ago
5 0
If the bully did not first befriend the person, it’s outing. If he did, then it’s trickery.
You might be interested in
Do you like Anime and if so if your 13-15 let’s be friends my number is 954 643 2050
BlackZzzverrR [31]

Answer:

nah fam

Explanation:

miss me with those 2d women

5 0
3 years ago
Which of the following refers to a descriptive technique involving the systematic collection of quantitative​ information? A. Lo
Nastasia [14]

Answer:

The answer is "Option C".

Explanation:

This technique is also known as walking-sectional experimental research, which only collects information at one stage. The goal of using this strategy is to create a single point, that provides representations to the population of interest, and other choices were wrong, that can be described as follows:

  • In option A, It is wrong, because this designing technique is used to search the relationship between variables.
  • In option B, It is a form of marketing, that provides communication via telephone, that's why it is incorrect.
  • In option D, It is used in research, that's why it is not correct.
  • In option E, It is wrong, because it is used in business.
6 0
3 years ago
Which of the following statements is true?
kompoz [17]
The answer to your question is A.
7 0
3 years ago
In this assignment you'll write a program that encrypts the alphabetic letters in a file using the Vigenère cipher. Your program
solniwko [45]

Answer:

C code is given below

Explanation:

// Vigenere cipher

#include <ctype.h>

#include <stdio.h>

#include <stdlib.h>

#include <string.h>

/**

* Reading key file.

*/

char *readFile(char *fileName) {

   FILE *file = fopen(fileName, "r");

   char *code;

   size_t n = 0;

   int c;

   if (file == NULL) return NULL; //could not open file

   code = (char *)malloc(513);

   while ((c = fgetc(file)) != EOF) {

      if( !isalpha(c) )

          continue;

      if( isupper(c) )

          c = tolower(c);

      code[n++] = (char)c;

   }

   code[n] = '\0';

  fclose(file);

   return code;

}

int main(int argc, char ** argv){  

   // Check if correct # of arguments given

   if (argc != 3) {

       printf("Wrong number of arguments. Please try again.\n");

       return 1;

   }

 

  // try to read the key file

  char *key = readFile(argv[1]);

  if( !key ) {

      printf( "Invalid file %s\n", argv[1] );

      return 1;

  }

 

  char *data = readFile(argv[2]);

  if( !data ) {

      printf("Invalid file %s\n", argv[2] );

      return 1;

  }

 

   // Store key as string and get length

   int kLen = strlen(key);

  int dataLen = strlen( data );

 

  printf("%s\n", key );

  printf("%s\n", data );

 

  int paddingLength = dataLen % kLen;

  if( kLen > dataLen ) {

      paddingLength = kLen - dataLen;

  }

  for( int i = 0; i < paddingLength && dataLen + paddingLength <= 512; i++ ) {

      data[ dataLen + i ] = 'x';

  }

 

  dataLen += paddingLength;

 

   // Loop through text

   for (int i = 0, j = 0, n = dataLen; i < n; i++) {          

       // Get key for this letter

       int letterKey = tolower(key[j % kLen]) - 'a';

     

       // Keep case of letter

       if (isupper(data[i])) {

           // Get modulo number and add to appropriate case

           printf("%c", 'A' + (data[i] - 'A' + letterKey) % 26);

         

           // Only increment j when used

           j++;

       }

       else if (islower(data[i])) {

           printf("%c", 'a' + (data[i] - 'a' + letterKey) % 26);

           j++;

       }

       else {

           // return unchanged

           printf("%c", data[i]);

       }

      if( (i+1) % 80 == 0 ) {

          printf("\n");

      }

   }

 

   printf("\n");

 

   return 0;

}

4 0
3 years ago
Read 2 more answers
Question # 4
bezimeni [28]

Answer:

the last one I think not 100% sure

6 0
4 years ago
Other questions:
  • An Information Technology worker who follows the Programming and Software development pathway most likely enjoys
    15·2 answers
  • The company involved in an attack by Oleg Zezev from Kazahkstan, in which Zezev accessed computer data and copied personal infor
    12·1 answer
  • Which osi layer defines the functions of logical network-wide addressing and routing?
    14·1 answer
  • Helping people keep track on things is the purpose of_____ A database B table C query D form​
    12·1 answer
  • Plssss helpppp!!<br><br>Thanks
    11·2 answers
  • What is the minimum number of data points you should usually have to look for signs of improvement on a run chart?
    8·1 answer
  • A programmer, or software developer, is a person with the training and skills necessary to ____________ computer programs.
    13·1 answer
  • Which can be used to plan a program?
    13·2 answers
  • Which command is used to copy entire folder structures between volumes or across a network while maintaining all NTFS file permi
    10·1 answer
  • Need the answer ASAP!!! I’ll mark brainliest if correct
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!