Using the Internet to deliberately harm or harass someone is called ____________.

Fill in the blank(s) with the appropriate word(s).


cyberbullying

Computer Science & Information Technology

You might also like to view...

________ are used to signal errors or unexpected events that occur while a program is running.

A) Virtual functions B) Destructors C) Exceptions D) Templates

Computer Science & Information Technology

The ________ property defines the stacking order for elements

Fill in the blank(s) with correct word

Computer Science & Information Technology

Select the information protection item that ensures that information is correct and that no unauthorized person or malicious software has altered that data.

A. availability B. confidentiality C. integrity D. identity

Computer Science & Information Technology

Obsolete technology components and used supplies are normally discarded with other office trash.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology