Two of the most common ways individuals are harassed online are cyberbullying and _____.

A. ?cyberailing
B. ?cyberjacking
C. ?cybersquatting
D. ?cyberstalking


Answer: D

Computer Science & Information Technology

You might also like to view...

You can name a database only after you have created it

Indicate whether the statement is true or false

Computer Science & Information Technology

Pressing the Alt+Tab keyboard shortcut increases the list level in an outline

Indicate whether the statement is true or false

Computer Science & Information Technology

Another name for a manipulator uses format flags is a ____ manipulator.

a. complex b. parameterized c. format d. customizable

Computer Science & Information Technology

____________________ drives contain both flash memory chips and magnetic hard drives.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology