Question and answer
Cyberbullying can occur on (Points:5) The internet, Cell phones, Other electronic devices, All of the above
ALL OF THE ABOVE. Cyberbullying can occur on - The internet, Cell phones, Other electronic devices.
s
Question
Asked 7/28/2016 9:35:09 PM
Updated 7/29/2016 4:17:21 AM
1 Answer/Comment
Edited by jeifunk [7/29/2016 4:16:56 AM]
Get an answer
New answers
Rating
3
ALL OF THE ABOVE. Cyberbullying can occur on - The internet, Cell phones, Other electronic devices.
Added 7/29/2016 4:17:21 AM
This answer has been confirmed as correct and helpful.
Comments

There are no comments.

Add an answer or comment
Log in or sign up first.
Questions asked by the same visitor
A subculture is a set of values, norms, and beliefs that differ from those of the dominant culture. True or false.
Weegy: A subculture is a set of values, norms, and beliefs that differ from those of the dominant culture. TRUE. User: Rejecting both the cultural goal of economic and the institutionalized means to obtain it is (More)
Question
Updated 7/23/2016 10:05:59 PM
1 Answer/Comment
Rejecting both the cultural goal of economic and the institutionalized means to obtain it is retreatism.
Added 7/23/2016 12:02:52 AM
This answer has been confirmed as correct and helpful.
Confirmed by Andrew. [7/23/2016 10:06:51 PM]
stalking is the willful and intention commission of
Question
Not Answered
Updated 85 days ago|7/3/2020 2:14:15 PM
1 Answer/Comment
Stalking is the willful and intention commission of: A series of acts that would cause a reasonable person to fear death or serious bodily injury.
Added 85 days ago|7/3/2020 2:14:15 PM
This answer has been confirmed as correct and helpful.
A skimming device is used for (Points: 5) Embezzlement, Espionage, Internet fraud, Theft of credit card information
Weegy: A skimming device is used for theft of credit card information. (More)
Question
Updated 7/29/2016 4:16:12 AM
0 Answers/Comments
Black Hat Hackers are considered the unethical or criminal hackers. True or false
Question
Updated 7/23/2016 1:44:00 AM
1 Answer/Comment
Black Hat Hackers are considered the unethical or criminal hackers. TRUE
Added 7/23/2016 1:44:00 AM
This answer has been confirmed as correct and helpful.
Confirmed by jeifunk [7/23/2016 8:42:27 PM], Rated good by jeifunk
32,272,394
questions answered
Popular Conversations
Egyptians used the Nile to __________ ...
9/21/2020 8:47:35 PM| 5 Answers
I didn’t do my homework; consequently, I did not get credit for the ...
Weegy: The movie was really bad; therefore, many people left early.
9/25/2020 7:18:53 PM| 3 Answers
The effort made by the mother's body to move the baby from the uterus ...
Weegy: The effort made by the mother's body to move the baby from the uterus and through the birth canal is called ...
9/23/2020 1:16:59 PM| 3 Answers
GET
Answers.
GET THE APP.
weegy*
*
Get answers from Weegy and a team of really smart live experts.
S
L
P
L
P
P
Points 1487 [Total 9587] Ratings 0 Comments 1487 Invitations 0 Online
S
L
Points 1471 [Total 1840] Ratings 0 Comments 1471 Invitations 0 Offline
S
L
P
R
P
R
L
P
P
C
R
P
R
L
P
R
P
R
Points 1468 [Total 15223] Ratings 7 Comments 1378 Invitations 2 Online
S
L
P
1
L
Points 1180 [Total 5463] Ratings 10 Comments 1080 Invitations 0 Offline
S
L
L
1
Points 679 [Total 6595] Ratings 6 Comments 619 Invitations 0 Offline
S
L
P
P
P
1
P
L
Points 636 [Total 8087] Ratings 15 Comments 486 Invitations 0 Offline
S
L
Points 451 [Total 482] Ratings 0 Comments 1 Invitations 45 Offline
S
L
1
Points 296 [Total 4300] Ratings 10 Comments 196 Invitations 0 Offline
S
L
Points 282 [Total 2816] Ratings 3 Comments 252 Invitations 0 Offline
S
L
Points 229 [Total 314] Ratings 1 Comments 219 Invitations 0 Offline
* Excludes moderators and previous
winners (Include)
Home | Contact | Blog | About | Terms | Privacy | © Purple Inc.