Not only did 1 in 4 teenagers experience online abuse, but how many are exposed to it

Answers

Answer 1

Answer: lots of teens will get this from cyber bullying and some people will mostly expeirience  it because they are not as popular as others

Explanation:

9% of U.S. teens have been bullied or harassed online, and a similar share says it's a major problem for people their age. At the same time, teens mostly think teachers, social media companies and politicians are failing at addressing this issue.


Related Questions

Junie is researching Ancient Egypt. She found a website that is full of information and great
images. As she is reading the text, she notices that there are little bits of information that don't
really agree with any of the other research she has done. What should she do?
O Use the website. Most of the information seems correct.
OUse only the information that she needs and ignore the information that doesn't seem right.
O Ask her friend what he thinks about the website.
O Evaluate the site using the CARS checklist to see if the site is valid and reliable.

Answers

Answer: Evaluate the site using the CARS checklist to see if the site is valid and reliable.

Explanation:

Which is a potential disadvantage of emerging technologies? A. increased spread of misinformation due to advanced communication technologies B. inefficient usage of energy due to advanced manufacturing technologies C. only benefiting developed countries rather than developing ones D. slowing down global economic growth

Answers

Answer: I believe it’s D.

Explanation: Less developed countries may not be able to afford the new technology, while more developed ones will be able to do so. Meaning the less developed countries will most likely not change.

Jobs with only 7 letters

Answers

Answer:

nursing

Explanation:

it's needs 20 words so don't mind thisssss part hehe

Answer: Teacher!!!!!!

Select the correct statement(s) regarding direct sequence spread spectrum (DSSS) and orthogonal frequency division multiplexing (OFDM).
a. OFDM is not classified as a spread spectrum technique, although OFDM has the effect of spreading the signal over a larger frequency spectrum
b. OFDM has greater spectral efficiency compared to DSSS
c. DSSS relies upon a PN code that is only shared by the transmitter and receiver pair
d. all statements are correct

Answers

Answer:

a. OFDM is not classified as a spread spectrum technique, although OFDM has the effect of spreading the signal over a larger frequency spectrum.

Explanation:

Orthogonal Frequency Division Multiplexing is a technique in which large digital data is sent over radio waves by splitting it into multiple subcarriers. The data is then transmitted to different users who can access the files. OFDM is not a spread spectrum technique, it is based on large frequency spectrum.

Write a function charInWord that takes in two parameters, a char (character) and a word (string). The program will return true if the character is in the word and false if it is not. If word is not a string type, or if char is not a string type, or if the length of char is greater than 1, the function should return None. Your main program should call the function and print char is in word if the function returns true, or char is not in word if the function returns false, using the user-supplied values instead of char and word. The program should print incorrect input provided if the function returns None. Ex: If the input is: a cat the output is: a is in cat Ex: If the input is: a club the output is: a is not in club Ex: If the input is: ab horse the output is:

Answers

Answer:

The program in Python, is as follows:

def charInWord(chr,word):

   if len(chr)>1:

       print("None")

   elif not(chr.isalpha() and word.isalpha()):

       print("None")

   else:

       if word.find(chr) == -1:

           print(chr+" is not in "+word)

       else:

           print(chr+" is in "+word)

chr = input("Character: ")

word = input("Word: ")

print(charInWord(chr,word))

Explanation:

This defines the function

def charInWord(chr,word):

This checks if the length of character is greater than 1

   if len(chr)>1:

If yes, it prints None

       print("None")

This checks if the character or the word contains invalid character

   elif not(chr.isalpha() and word.isalpha()):

If yes, it prints None

       print("None")

This is executed for valid parameters

   else:

If the character is not present, this is executed

       if word.find(chr) == -1:

           print(chr+" is not in "+word)

If the character is present, this is executed

       else:

           print(chr+" is in "+word)

The main begins here

This gets the character

chr = input("Character: ")

This gets the word

word = input("Word: ")

This calls the method and prints the required output

print(charInWord(chr,word))

Write a program in file MinMax.py that accepts an arbitrary number of integer inputs from the user and prints out the minimum and maximum of the numbers entered. The user will end the input loop by typing in the string 'stop'. When the user enters 'stop' your program should print out the minimum integer entered and the maximum integer entered. If the user enters 'stop' immediately (i.e., before any numbers are entered), you'll print a slightly different message. See the examples below: You can assume that the values entered are integers (positive, negative or zero) or the string 'stop' (lowercase). You don't have to validate the inputs. > python Min Max. py
Enter an integer or 'stop' to end: stop You didn't enter any numbers > python Min Max. py
Enter an integer or 'stop' to end: -10
Enter an integer or 'stop' to end: 0 Enter an integer or 'stop' to end: +42
Enter an integer or 'stop' to end: 87 Enter an integer or 'stop' to end: -100
Enter an integer or 'stop' to end: stop The maximum is 87 The minimum is -100

Answers

Answer:

The program is as follows:

numlist = []

num = input("'stop' to end: ")

while not (num == "stop"):

   numlist.append(int(num))

   num = input("'stop' to end: ")

   

if len(numlist) == 0:

   print("You didn't enter any numbers")

else:

   print("The maximum is "+str(max(numlist))+" and The minimum is "+str(min(numlist)))

Explanation:

This declares an empty list

numlist = []

This prompts the user for input

num = input("'stop' to end: ")

This loop is repeated until the user enters 'stop'

while not (num == "stop"):

This appends the input to the list

   numlist .append(int(num))

This prompts the user for input

   num = input("'stop' to end: ")

   

If the length of the list is 0, then the user entered no input

if len(numlist) == 0:

   print("You didn't enter any numbers")

If otherwise, this prints the min and the max

else:

   print("The maximum is "+str(max(numlist))+" and The minimum is "+str(min(numlist)))

The program that accepts an arbitrary number of integer inputs from the user and prints out the minimum and maximum of the numbers entered is as follows:

numbers = []

x = input("Enter an integer and stop to end: ")

while not(x == "stop"):

    numbers.append(int(x))

    x = input("Enter an integer and stop to end: ")

if len(numbers) == 0:

    print("You didn't enter any numbers ")

else:

    print(f"The maximum number is {max(numbers)} and the minimum number is {min(numbers)}")

Code explanation:

The code is written in python

The first line of code, we declared a variable named numbers and it is an empty list for storing our integers.The variable x is stores the user inputwhile the user's input is not lowercase "stop", the user's input is appended to numbers. Then the program ask for the users input as long as it is an integers inputif the length of the list is 0, then we print a statement to ask the user to enter a number.Else we print the maximum and minimum number of the user's input.

learn more on python code here: https://brainly.com/question/19175881

what is memory address map​

Answers

the mapping between loaded executable or library files and memory regions, these are used for resolving memory addresses

What is the most likely reason a user would export data with the formatting in place?

A) The fields will not have any errors.

B) The file will be much easier to read.

C) The file is automatically spellchecked.

D) The columns are automatically alphabetized.

Answers

Answer:

its d

Explanation:

Answer:

its b on edge

Explanation:

believe me if youre a viber

Fill in the blank with the correct response.
Your Java class should be given the same name as your Java
.

Answers

Answer:

program

Explanation:

Rupesh wants to try programming with Eclipse. What is the first step he should take to make that happen?


download the Eclipse IDE

download the current Java Development Kit

create a restore point

disable his security program

Answers

Answer:

create a restore point

Explanation:

What are some common uses of Excel?

Answers

Answer:

to make a spread sheet and to make sure you have all of the sum and didn[t miss a number

Explanation:

Read these sentences from the passage:
“The TV and the glasses work together. When the TV flashes the image meant for the right eye, the right lens is clear and the left lens is dark.

Which of the following describes the relationship between the first and second sentence?

Answers

Answer

It is B

Explanation:

Answer:

It's giving further information

Explanation:

Write a program that will read two floating point numbers (the first read into a variable called first and the second read into a variable called second) and then calls the function swap with the actual parameters first and second. The swap function having formal parameters number1 and number2 should swap the value of the two variables

Answers

Answer:

In Python:

def swap(number1,number2):

   a = number1

   number1 = number2

   number2 = a

   return number1, number2

   

first = float(input("First Number: "))

second = float(input("Second Number: "))

print("After Swap: "+str(swap(first,second)))

Explanation:

The swap function begins here

def swap(number1,number2):

This saves number1 into variable a

   a = number1

This saves number2 into number1

   number1 = number2

This saves a (i.e. the previous number1) to number2

   number2 = a

This returns the numbers (after swap)

   return number1, number2

   

The main begins here

The next two lines prompt the user for first and second numbers

first = float(input("First Number: "))

second = float(input("Second Number: "))

This calls the swap function and print their values after swap

print("After Swap: "+str(swap(first,second)))

Which of the following characterizes how an enabled security program might react to a new program installation on a computer system?


It might alert you to space requirement excesses.

It might report an error or tell you that the file is corrupted.

It might protect the new installation from getting viruses.

It might automatically set a restore point for the computer system.

Answers

Answer:

It might automatically set a restore point for the computer system

Answer:

It might report an error or tell you that the file is corrupted.

Explanation:

Define the Database ​

Answers

A structured base in a computer

A gui allows you to interact with objects on the screen such as icons and buttons true or false

Answers

Answer:

True

Explanation:

PLEASE SOMEONE ANSWER THIS
If the old code to a passcode was 1147, and someone changed it, what would the new code be?

(I already tried 4117)



[I forgot my screen time passcode please someone help I literally can’t do anything on my phone.]

Answers

Answer:

Any of these?

Explanation:

1147. 4117. 7411

1471. 4171

1714. 4711

1741. 7114

1417. 7141

Answer:

1417

Explanation:

You are a visitor at a political convention with delegates; each delegate is a member of exactly one political party. It is impossible to tell which political party any delegate belongs to; in particular, you will be summarily ejected from the convention if you ask. However, you can determine whether any pair of delegates belong to the same party or not simply by introducing them to each other. Members of the same party always greet each other with smiles and friendly handshakes; members of different parties always greet each other with angry stares and insults.

Required:
Suppose more than half of the delegates belong to the same political party. Design a divide and conquer algorithm that identifies all member of this majority party and analyze the running time of your algorithm.

Answers

Answer:

The algorithm is as follows:

Step 1: Start

Step 2: Parties = [All delegates in the party]

Step 3: Lent = Count(Parties)

Step 4: Individual = 0

Step 5: Index = 1

Step 6: For I in Lent:

Step 6.1: If Parties[Individual] == Parties[I]:

Step 6.1.1: Index = Index + 1

Step 6.2: Else:

Step 6.2.1 If Index == 0:

Step 6.2.2: Individual = I

Step 6.2.3: Index = 1

Step 7: Else

Step 7.1: Index = Index - 1

Step 8: Print(Party[Individual])

Step 9: Stop

Explanation:

The algorithm begins here

Step 1: Start

This gets the political parties as a list

Step 2: Parties = [All delegates in the party]

This counts the number of delegates i.e. the length of the list

Step 3: Lent = Count(Parties)

This initializes the first individual you come in contact with, to delegate 0 [list index begins from 0]

Step 4: Individual = 0

The next person on the list is set to index 1

Step 5: Index = 1

This begins an iteration

Step 6: For I in Lent:

If Parties[Individual] greets, shakes or smile to Party[i]

Step 6.1: If Parties[Individual] == Parties[I]:

Then they belong to the same party. Increment count by 1

Step 6.1.1: Index = Index + 1

If otherwise

Step 6.2: Else:

This checks if the first person is still in check

Step 6.2.1 If Index == 0:

If yes, the iteration is shifted up

Step 6.2.2: Individual = I

Step 6.2.3: Index = 1

If the first person is not being checked

Step 7: Else

The index is reduced by 1

Step 7.1: Index = Index - 1

This prints the highest occurrence party

Step 8: Print(Party[Individual])

This ends the algorithm

Step 9: Stop

The algorithm, implemented in Python is added as an attachment

Because there is an iteration which performs repetitive operation, the algorithm running time is: O(n)

We investigated a program which is probably used as one component of a bigger password breaking algorithm. We determined that the program can input arbitrary N-bit queue and for actual N-bit input also the program output will be always N bits long. Additionally we noticed that the longer program input is, the longer will be the output calculating time. After performing some repeating tests we also determined that the program working time depends only and exactly on input length, not on the input itself.



Finally we fixed some actual working times:



-for N=10 - 10.576 seconds;

-for N=20 - 11.087 seconds;

-for N=25 - 13.544 seconds;

-for N=30 - 27.442 seconds;

-for N=35 - 1 minute 46.059 seconds;

-for N=40 - 9 minutes 10.784 seconds.



Task:



a) Find the program working time for N=50.

b) Please derive the mathematical formula using which is possible to calculate actual working time for arbitrary N.

Answers

Answer:

i dont know

Explanation:

Other Questions
plz help for brainliest Keely went for a long swim. If she swam 12 miles in 3 hours, how long would she swim in 6 hours? Each batch of Blueberry Breakfast Treats will make 12 muffins. Mrs. Penney wants to make enough muffins for each of the 35 students in her math club and herself to have one.Blueberry Breakfast TreatsNumber of Batches1234Cups of BlueberriesThree-fourths------On a coordinate plane, a graph titled Blueberry Breakfast Treats has batches on the x-axis and Blueberries on the y-axis. Points A is (2, 1.5), point B is (2.6, 2.25), point C is (3, 2.25), point D is (4, 3).If she does not want any leftovers, which point should Mrs. Penney use to determine the amount of blueberries she will need to make her muffins?ABCDI think its B I am taking my test rn so I wanna double check if 10= 15/-6+x , what is the value of 5 + xa.7.5 b.12.5 c.80 d.0.5 553.5 mL ?:cm^3how do i get my answer? and what is the answer? Which statement describes a difference between a jellyfish and a frog?A jellyfish lacks vertebrae, whereas a frog has a spinal cord. A jellyfish cannot reproduce sexually, but a frog can. A jellyfish makes its own food, whereas a frog is a heterotroph. A jellyfish is a prokaryote, whereas a frog is a eukaryote. What is the missing length.. Draw a cone with a height of 9 in. and a diameter of 4 in. Find the volume. Round to the nearest tenth twenty-nine to the wthpower? that's my question I dont get please help Which statements describe potential effects of using a river to irrigate a farms field? Check all that apply.The farmer preserves the natural habitat of the river by rerouting water from the river.Governments make rules to regulate how farms get water for their irrigation.The rerouted river leads to the deforestation of the farmers land.The farmer makes more money by being able to successfully grow crops.Farmers downriver get angry because now they do not have enough water to use on their farms.Lower water levels on the river change the environment for animals that depend on the river. (27/64) to the power of 2/3 Circle the errors and explain what the error is. PLEASE HELP!!!What message did Congress send when it closed the Unorganized Territory to slavery? 1. Describe a recent modern "story" you heard, read, or saw. Explain how that story taught you an important idea about life, family, or society. Be sure to talk about where/how you heard/read about the story in your description. 2. Describe a simulation game you've played recently or have heard about (you may even propose a simulation game idea yourself). Explain why that game fits the definition ofba simulation.3. in an age of books, films, television, why are games important?4 think of a game you enjoy. For that game, Describe some of its objectives, rules, operstion, obstacles, and outcomes.5. What is the main difference between a video game and other types of games (board games, card games, tag, etc.)? What are the similarities? If x < 0 and y < 0, where is the point (x, y) located? quadrant As with hearing communication conversations in asl are enhanced by(ASL) Use the drop down menus to identify the element of a persuasive speech used in each excerpt from chavez's speech my friends today What is the equation of the line that has a slope of 4 and passes through the point (4,1) What is the slope of this line? Regarding military law:A. each branch is governed by their own laws.B. the accused always has a right to military counsel.C. it uses the same laws as civilians.D. its based on one common set of military rules.