To protect yourself against ____________________ and other types of online harassment, use gender-neutral, nonprovocative identifying names.
Fill in the blank(s) with the appropriate word(s).
cyberstalking
Computer Science & Information Technology
You might also like to view...
For object-oriented programs, ____ allocation allows creating and destroying new objects as required.
A. fixed B. compiler C. static D. dynamic
Computer Science & Information Technology
The Ribbon contains the graphic collection of command buttons that are organized by tabs and in groups.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
When two colors are placed side by side, they interact with one another in a phenomenon called ____ contrast.
a. complementary b. proximate c. simultaneous d. juxtaposed
Computer Science & Information Technology
A variant where the attacker includes malicious script content in data supplied to a site is the __________ vulnerability.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology