Tricking someone into sharing personal information and then sharing it with others electronically is

a. trickery.
b. flaming.
c. impersonation.
d. cyberstalking.


Answer: A

Education

You might also like to view...

The authors of Powerful Social Studies advocate

a. following a pacing guide to ensure that minimal standards are met. b. using the textbook as the single source because it addresses a full range of instructional situations. c. assessing large groups, small groups, and individuals using a host of tools. d. assigning home activities only for upper-grade students.

Education

Backward chaining has been successfully used as a method for teaching a variety of skills and begins by

teaching which part of the task first? a. the first step b. the last step c. the entire task d. none of the above

Education

Fred conducts a one-way ANOVA comparing five groups, each of which consists of 5 participants (N = 5). In evaluating the F-ratio for this analysis, what is the critical value for ? = .05?

a. 2.69 b. 2.78 c. 2.87 d. 5.05

Education

The use-it-or-lose-it principle is most closely related to _____.

a. hemisphericity b. synaptic pruning c. teratogens d. experience-expectant plasticity

Education