1answer.
Меню
Ask question
Login
Signup
Ask question
Menu
All categories
English
Mathematics
Social Studies
Business
History
Health
Geography
Biology
Physics
Chemistry
Computers and Technology
Arts
World Languages
Spanish
French
German
Advanced Placement (AP)
SAT
Medicine
Law
Engineering
Evgen
[1.6K]
2 years ago
15
Which type of evidence should victims collect to help officials catch cyber bullies?home addressesbirthdayssocial media username
suser passwords
Computers and Technology
Answer
Comment
Send
1
answer:
skad
[1K]
2 years ago
3
0
Bjejfjdjdjdjdjdjdjdndjdjdjdjdjdjdjdjdjdjdjdjdjdjdjdjddjjddjjdjdjdjd
Send
You might be interested in
Alexa it is olewi.............................................
Sladkaya [172]
Answer:
jvksvksdvkbvkjsdkcn
Explanation:
6
0
2 years ago
Read 2 more answers
Spam and i report
defon
Answer:
option d is the correct answer
8
0
2 years ago
Read 2 more answers
When did internet came to existence?
Luden [163]
1982 the Internet protocol was introduced as the standard network protocol on the ARPANET.
1981 access to the ARPANET was expanded.
7
0
3 years ago
Please help!! I need this asap! thank you so much!! <3
ValentinkaMS [17]
I think it’s the last one
6
0
2 years ago
………………….. is the process of causing a system variable to conform to some desired value. Options Control feedback Design none of
frutty [35]
Control <span>is the process of causing a system variable to conform to some desired value. Options Control feedback Design none of the above</span>
4
0
2 years ago
Other questions:
George borrowed some equipment from his friend for recording his monologue for his art class. He got all the equipment except th
15
·
1 answer
The term used to describe an electronic device, operating under the control of instructions stored in its own memory, that can a
7
·
1 answer
If you were given a 3D microscope to use for photography, which object(s) would you most want to photograph?
10
·
2 answers
Person-name: String+setName(String name): void+getName(): String^Student-studentID: long+Student(String sname, long sid)+setID()
10
·
1 answer
When you check to see how much RAM, or temporary storage you have available, you are checking your _____.
7
·
1 answer
It is important to verify internet source because-------- choose that apply. A.the source should be written by real author. B.an
6
·
2 answers
Why are application programs stored in main memory
11
·
1 answer
Explain the role of a computer in education
9
·
1 answer
True or False(T or F): Point-and-shoot cameras have only 1 lens. *
5
·
1 answer
Which of the listed tools would a barber likely use in the following scenario?
15
·
1 answer
×
Add answer
Send
×
Login
E-mail
Password
Remember me
Login
Not registered?
Fast signup
×
Signup
Your nickname
E-mail
Password
Signup
close
Login
Signup
Ask question!