1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Evgen [1.6K]
2 years ago
15

Which type of evidence should victims collect to help officials catch cyber bullies?home addressesbirthdayssocial media username

suser passwords
Computers and Technology
1 answer:
skad [1K]2 years ago
3 0
Bjejfjdjdjdjdjdjdjdndjdjdjdjdjdjdjdjdjdjdjdjdjdjdjdjddjjddjjdjdjdjd
You might be interested in
What is a cell address in xsl sheet
fgiga [73]

Answer:

cell address is the exact location of a particular cell of ms-excle

Explanation:

A1 refers to first row and first column.

A2 refers to second row first column.

i.e.

in 'A1' : 'A' indicate column { A= first column, B= second

column, C= third column. and soon.....}

'1' indicate row { 1 = first row, 2 = second row, 3= third row..... soon .......}

5 0
3 years ago
Just admit it. You have more than one account on brainly. If not several you have one where you have a bad reputation and anothe
Paha777 [63]

Answer:

No I don't this is my only account ;-;

Explanation:

But I have considered making a new one but for now this is my only account lolll although it does seem to make good sense when it comes to having a bad reputation on the other account. why haven't I thought about that- see how slow I am dang g , I am dummer that I thought I was..Imaoo

3 0
3 years ago
Read 2 more answers
Help please im not sure what this means T^T
Vesna [10]

Answer:

14

Explanation:

7 0
3 years ago
Read 2 more answers
You have been tasked with ensuring that access to certain server managed resources is only available to client devices with TPM
elixir [45]

Answer:

Device Health Attestation Services

Explanation:

Based on the scenario being described it can be said that the Windows Server role that can be used to automate this check is known as Device Health Attestation Services. This is a role that allows the administrator to automatically check if a device has the required trustworthy BIOS, TPM, or boot software enabled, as well as Bitlocker encryption.

7 0
3 years ago
An IT Manager is reviewing the company’s approach to data privacy for a new project. What can happen if the company does not col
photoshop1234 [79]

Answer:

The company might not be able to satisfy their customers

5 0
2 years ago
Other questions:
  • HELP ASAP!!!!!!!!! ITS A UNIT TEST: WILL MARK AS BRAINLIEST>
    13·1 answer
  • Jannette has been experiencing slow performance on her computer. Today she received an error message saying that an update to he
    12·2 answers
  • ​A(n) ____ statement can include rules for site visitors, a statement of copyright in the site design and content, and can restr
    12·1 answer
  • The number of square units required to cover a surface.
    13·1 answer
  • How do you compare text on different pages of a document?
    14·1 answer
  • How do you change your age on Brainly?
    10·1 answer
  • Different network devices function at different network communication layers, depending on their purpose. Using the TCP/IP model
    5·1 answer
  • Write a Java program that prints out a 4x4 square (like the one below)
    11·1 answer
  • Meaning and explanation of fortran​
    11·2 answers
  • If every company is now a technology company, then what does this mean for every student attending a business college
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!