Which of the following involves using the Internet to harass, threaten, or intimidate another person?

a. Cyberstalking
b. Looping
c. Phishing
d. Licensing


Answer A.

Computer Science & Information Technology

You might also like to view...

The ___________________ instruction is used to step through each element of a list.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Personal ________ software can be used to keep track of your bank accounts, monitor investments, create and stick to a budget, and file income taxes

A) tax preparation B) finance C) accounting D) budgeting

Computer Science & Information Technology

Dealing with exceptional situations as an application executes is called ______.

a) exception detection b) exception handling c) exception resolution d) exception debugging

Computer Science & Information Technology

With ________, or online storage, you can access your files from any computer with an Internet connection.

A. Blu-ray B. optical C. cloud storage D. virtual storage

Computer Science & Information Technology