1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Viktor [21]
3 years ago
5

Why does people that gets abused not report?

Computers and Technology
1 answer:
AleksandrR [38]3 years ago
7 0
It might be because they are afraid that tge person they report will likley get into trouble or the report might not work and they will be abused more
You might be interested in
Individuals who break into computer systems with the intention of doing damage are called​ _____________.
notka56 [123]
I think the answer is hackers
7 0
3 years ago
Jennifer has her own business. Recently, she has ventured into creation of a new line of apparel. She has created a new symbol t
Zolol [24]
I am think that is the anwer trademark
3 0
3 years ago
Read 2 more answers
Verbs in the active and passive voice
natulia [17]

Answer:

Voice refers to the form of a verb that indicates when a grammatical subject performs the action or is the receiver of the action. When a sentence is written in the active voice, the subject performs the action; in the passive voice, the subject receives the action.

5 0
3 years ago
When the program generates or populates reports after getting the data and processinng,it is called
TiliK225 [7]

Answer:

In computing, extract, transform, load (ETL) is the general procedure of copying data from one or more sources into a destination system which represents the data differently from the source(s) or in a different context than the source(s).

Data extraction involves extracting data from homogeneous or heterogeneous sources; data transformation processes data by data cleansing and transforming them into a proper storage format/structure for the purposes of querying and analysis; finally, data loading describes the insertion of data into the final target database such as an operational data store, a data mart, data lake or a data warehouse. Hope this helps! PLEASE GIVEE ME BRAINLIST!!! =)

6 0
3 years ago
When computer boots which I pont program starts first? O Operating System O Metaphor System O Basic System O Computer System​
beks73 [17]
The answer is Operating system
8 0
3 years ago
Other questions:
  • The source ip address is 164.109.28.3 subnet mask of 255.255.128.0 network address is
    7·1 answer
  • When you compile your program, the compiler identifies the logic errors and suggests how to correct them?
    14·1 answer
  • In an ipv4 address, what are the maximum number of bits that can be used to identify the network address
    14·1 answer
  • You want to use a wireless keyboard and mouse with your laptop computer. which method should you use
    11·1 answer
  • A Network Systems employee set up a network-wide password system in which other employees log in to access their work. Which tas
    6·2 answers
  • You are evaluating the bounce rate of your overall website traffic and find that users with a social media referral source have
    6·1 answer
  • You receive an offer in the mail that says you're eligible to win a cash prize if you place some stickers on a form and return i
    5·1 answer
  • You are tasked with designing an airplane that could carry a very large load of cargo. What type of airfoil would you use for th
    13·1 answer
  • A ___________ variable is used to add up a set of values. fill in the blank
    8·1 answer
  • I just wanna know how many times a day y'all hit the tutor button at the bottom
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!