Two of the most common ways individuals are harassed online are cyberbullying and _____.
A. ?cyberailing
B. ?cyberjacking
C. ?cybersquatting
D. ?cyberstalking
Answer: D
Computer Science & Information Technology
You might also like to view...
You can name a database only after you have created it
Indicate whether the statement is true or false
Computer Science & Information Technology
Pressing the Alt+Tab keyboard shortcut increases the list level in an outline
Indicate whether the statement is true or false
Computer Science & Information Technology
Another name for a manipulator uses format flags is a ____ manipulator.
a. complex b. parameterized c. format d. customizable
Computer Science & Information Technology
____________________ drives contain both flash memory chips and magnetic hard drives.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology