Which of the following involves using the Internet to harass, threaten, or intimidate another person?
a. Cyberstalking
b. Looping
c. Phishing
d. Licensing
Answer A.
Computer Science & Information Technology
You might also like to view...
The ___________________ instruction is used to step through each element of a list.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Personal ________ software can be used to keep track of your bank accounts, monitor investments, create and stick to a budget, and file income taxes
A) tax preparation B) finance C) accounting D) budgeting
Computer Science & Information Technology
Dealing with exceptional situations as an application executes is called ______.
a) exception detection b) exception handling c) exception resolution d) exception debugging
Computer Science & Information Technology
With ________, or online storage, you can access your files from any computer with an Internet connection.
A. Blu-ray B. optical C. cloud storage D. virtual storage
Computer Science & Information Technology