1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yanalaym [24]
2 years ago
13

8. If you, or someone you know is a victim of cyber-bullying what should you do? not say a word ,write mean things back ,report

it ignore it​
Computers and Technology
2 answers:
In-s [12.5K]2 years ago
7 0

Answer:

I would not ignore it and do something about it but since that is not a option I would pick report it ignore it

Explanation:

That would be the right thing to do because If you do not say a word you will not change nothing and you should not just stay there and do nothing about it and if you write mean things back that is not going to get you anywhere because then you would also be cyber-bullying and sometimes people only bully you because they have problems and they can not fix it or sometimes they just do it because they think it is fun but it is not because you could hurt the person that you are bullying therefor I would not do none but the best choice is the last one. Hope it helps you!

bearhunter [10]2 years ago
4 0

Answer:

report it

Explanation:

You might be interested in
What is the term used to describe data sets are so large and complex that they become difficult to process using traditional dat
slega [8]

Answer:

Big Data

Explanation:

Big Data refers to data sets that are large, comprising of different varieties (structured and unstructured data types) and which cannot be processed by the day to day database management systems and computer software otherwise referred to as traditional software and techniques.

The term Big does not necessarily refer to a particular size that a dataset must attain but describes the nature of the dataset and the fact that traditional database management systems cannot be used to process them take for example

The datasets of the entire product list from amazon

5 0
3 years ago
In the following nested loop structure, which loop does the program EXIT first?
seropon [69]

Answer:

The loops are nested, and the program ends when loop 1 is completed. Since loop 4 is the innermost one, that one is completed first.

7 0
3 years ago
Who would use a CLI? (Command Line Interface)
JulijaS [17]
CLIs are often used by programmers and system administrators, in engineering and scientific environments, and by technically advanced personal computer users.
7 0
3 years ago
A ___ is a node (or a device) that connects two different networks together and allows them to communicate.
stellarik [79]

Answer:

The answer is Hub

Explanation:

A hub, also called a network hub, is a common connection point for devices in a network. Hubs are devices commonly used to connect segments of a LAN. The hub contains multiple ports. When a packet arrives at one port, it is copied to the other ports so that all segments of the LAN can see all packets.

7 0
3 years ago
Let's say that you handle the IT systems administration for your company. There's a server inside of your organization that chec
kirill115 [55]

From server do some file transfer to client PC to sync to the server.

<u>Explanation:</u>

As IT System administrator if PC or client or workstation or laptop not connected to network more than 3 months from windows server we need to refresh the connection and redo the connection from server to the client to do sync the activities.

Moreover from domain server refresh and re sync activities to establishing the connection.

Go to client PC or workstation or desktop login log and logout from the PC and login to domain account by changing the password.

7 0
3 years ago
Other questions:
  • ​_______ consists of the analysis​ tools, technologies, and processes by which marketers dig out meaningful patterns in big data
    7·1 answer
  • What are the desirable qualities of a Product Vision?
    11·1 answer
  • What are the cause of eye strain during computer usage?
    7·1 answer
  • Choose a developing country and give 3 reasons why it is a developing country ​
    15·1 answer
  • Two technicians are discussing shielded cable. Technician A says that shielded wires are generally twisted in pairs to cancel th
    14·1 answer
  • Although designed to support remote dial-in access to a corporate network, what service below is commonly used with 802.1x port
    12·1 answer
  • What will be the results from running the following code?
    5·1 answer
  • 2. The internet offers a great source of information; however, how are
    9·1 answer
  • If a citation has a volume, title, and page numbers, it is a:
    9·2 answers
  • PYTHON HW PLEASE HELP. I NEED THE ACTUAL CODE!!! 100 POINTS AND BRAINLIEST. REPORTING IF YOU DON'T ANSWER
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!