To protect yourself against ____________________ and other types of online harassment, use gender-neutral, nonprovocative identifying names.

Fill in the blank(s) with the appropriate word(s).


cyberstalking

Computer Science & Information Technology

You might also like to view...

For object-oriented programs, ____ allocation allows creating and destroying new objects as required.

A. fixed B. compiler C. static D. dynamic

Computer Science & Information Technology

The Ribbon contains the graphic collection of command buttons that are organized by tabs and in groups.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When two colors are placed side by side, they interact with one another in a phenomenon called ____ contrast.

a. complementary b. proximate c. simultaneous d. juxtaposed

Computer Science & Information Technology

A variant where the attacker includes malicious script content in data supplied to a site is the __________ vulnerability.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology