The cyberbullying of one adult by another adult, using a computer is known as ________.

A) pharming
B) phishing
C) cyberbullying
D) cyber-harassment


Answer: D) cyber-harassment

Computer Science & Information Technology

You might also like to view...

Which of the following statements is false?

a. Individuals who have no sense of right or wrong exhibit amoral behavior. b. Ethical decisions are usually influenced by personal ethics. c. Unethical behavior is always illegal. d. Life experience affects an individual's personal ethics.

Computer Science & Information Technology

Why does the kernel allocate page frames to processes from normal and high memory before allocating pages from DMA memory?

What will be an ideal response?

Computer Science & Information Technology

Define: the Rescorla

What will be an ideal response?

Computer Science & Information Technology

How does hashing detect integrity violations?

A. The bit length of the hash must be divisible by three. B. The content of the hash is verified against the standard. C. A before and after hash value is compared. D. The length of the hash is checked.

Computer Science & Information Technology