1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Evgen [1.6K]
3 years ago
15

Which type of evidence should victims collect to help officials catch cyber bullies?home addressesbirthdayssocial media username

suser passwords
Computers and Technology
1 answer:
skad [1K]3 years ago
3 0
Bjejfjdjdjdjdjdjdjdndjdjdjdjdjdjdjdjdjdjdjdjdjdjdjdjddjjddjjdjdjdjd
You might be interested in
1. Bones do not change position when the muscles contract and release.
DochEvi [55]
TrueBones do not change position
6 0
4 years ago
The background image does not affect any cell’s format or content. _______
Korvikt [17]
Hmmm...that is true 
Here a quizlet about if you need it!
https://quizlet.com/15207805/csci-241-flash-cards/
3 0
3 years ago
(PLEASE HELP!! I'll award brainiest!!)
Bas_tet [7]

Answer:

Repair

Have a good day

3 0
3 years ago
Read 2 more answers
An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The at
Anni [7]

"A Buffer overflow" vulnerability exploit resulted from the attacker's actions.

Whenever a software or an application writes too much data into a buffer, causing neighboring storage regions to have been corrupted as a consequence, this could be determined as Buffer overflow.

⇒ There are two kinds of Buffer overflow attacks such as:

  • <u>Stack-based</u> - It will become more popular to use such memory, as well as that's only available during implementation of any code.
  • <u>Heap-based</u> - Those attacks seem to be more difficult to execute because they entail overflowing overall storage capacity allotted for a program further than the space needed for something like the program's present activities.

Thus we can say that the correct answer is a Buffer overflow.

Learn more about Buffer overflow here:

brainly.com/question/4952591

6 0
3 years ago
How Do you get Splatoon two for free
IRISSAK [1]

Answer:

Well the real question would be how comfortable are you with computer software if not good or none at all I feel the answer would simply be buy the game in the Nintendo store or you could buy the key for the Nintendo store for much cheaper on 3rd party websites give that a try hope this helped you. :)

5 0
3 years ago
Read 2 more answers
Other questions:
  • Drag the tiles to the correct boxes to complete the pairs. Match the tools that you can use while solving a problem with their c
    6·2 answers
  • Being technologically literate requires being able to ______.
    11·2 answers
  • If you are working with a team of students on a class project and your team chooses to share content by uploading Word and Excel
    13·1 answer
  • Keith is researching a controversial topic and wants to use a website he found as an information source. Which of the following
    11·2 answers
  • Need help!! Write an interactive program that reads lines of input from the user and converts each line into "Pig Latin." Pig La
    9·1 answer
  • In which type of class methods is it typically necessary to filter bad arguments (either directly or indirectly with the help of
    13·1 answer
  • NEED HELP ASAP
    13·2 answers
  • Plz plz plz help me with me
    14·2 answers
  • You can use the ____ method to search a string to determine whether it contains a specific sequence of characters.
    14·1 answer
  • Question 4 (5 points) If your social media accounts are___________, college admissions representatives can look at your social m
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!