1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Illusion [34]
3 years ago
8

Tricking someone else into sharing private information, then posting it publicly online, is a form of which type of cyberbullyin

g?
Denigration
Exclusion
Outing
Trickery
Computers and Technology
1 answer:
Alisiya [41]3 years ago
5 0
If the bully did not first befriend the person, it’s outing. If he did, then it’s trickery.
You might be interested in
Srooy but can you guys help me with this​(sorry again miss click
telo118 [61]

what miss click let me know when you got the real one      

5 0
3 years ago
Identify a true statement about decision support systems (DSSs).
Zolol [24]

Answer:

a. facilitate improvements but do not necessarily cause them.

Explanation:

Decision Support Systems are interactive Information systems that assist  decision makers in coming up with strategies that help the organisation achieve its goals .The model base of the DSS uses mathematical and statistical models to analyse information then it generates reports and suggest possible solutions that can be implemented .The system is capable of giving a specific solution and some even allow the decision makers to give input before suggesting the most applicable solution.The effectiveness of a DSS is equally as important as its efficiency .The DSS unlike the conventional decision-making process should be able to analyse information effectively and come up with solutions in the shortest possible time frame.

7 0
4 years ago
Select the correct answer. Which is an example of noisy data in data sources? A. Age: 987 B. Gender: Male C. First Name: Gary D.
umka21 [38]

Answer:

A. Age 987 is the noisy data

Explanation:

Undoubtedly, this one is, as it is going to create a buzz in each person ear, who is going to listen it.  This age is almost impossible. However, some Monks from Tibet have been able to live for so long however! And this makes my answer a noisy data, as many will not believe on first read. Something which is rare, is the noisy data. And when it is proved and accepted, it becomes a noisy information.

7 0
3 years ago
What is the HIPAA privacy rule, and why does it affect IT professionals.
user100 [1]
It protects a persons identifiable health information and medical records.
4 0
2 years ago
Recycling one glass jar saves enough energy to watch television for 3 hours
vaieri [72.5K]

Answer:

Cool

Explanation:

Thanks for the info

7 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the applications below is designed to help a user bypass enforced web filtering policies?
    15·1 answer
  • Write a program to add two number marie simulator.
    15·1 answer
  • Your database was damaged due to hardware failure. What can you use to restore it?
    5·1 answer
  • The term____relates to all things that we see.
    13·1 answer
  • What is a histogram?
    10·1 answer
  • Write a statement that reads a floating point value from standard input into temperature. Assume that temperature. has already b
    6·1 answer
  • This is your code.
    9·1 answer
  • Slayyy queeen slayyy
    12·2 answers
  • A.1111+1011. b. 10111+11111 c. 1111*1011 d. 1110*1101 perform the binary calculations.​
    12·1 answer
  • A(n) ________ is the portion of virus code that is unique to a particular computer virus. A) virus signature B) encryptio
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!