Repeated threats or other harassment carried out online between adults is referred to as ____.

A. cyberstalking
B. computer sabotage
C. cyberterrorism
D. phishing


Answer: A

Computer Science & Information Technology

You might also like to view...

Time algorithms taken across multiple machines is the best way for comparing two algorithms that do the same task.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The current version of the Border Gateway Protocol is ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Explain why an assignment of an endpoint reference to myRole of a partnerLink makes no sense.

What will be an ideal response?

Computer Science & Information Technology

For entity classes in JPA, an NamedQueries annotation specifies a collection of ________ annotations that declare various named queries.

a. Entity—Specifies that the class is an entity class. b. Table—Specifies the entity class’s corresponding database table. c. NamedQuery d. None of the above.

Computer Science & Information Technology