Which of these could be considered a course of conduct directed at a specific person that causes substantial emotional distress in such person and serves no legitimate purpose?
a. Phishing
b. Browsing
c. Harassment
d. None of the above
Answer C.
Computer Science & Information Technology
You might also like to view...
The ____ content model allows an element to store any type of content.
A. OPEN B. mixed C. #PCDATA D. ANY
Computer Science & Information Technology
Which of the following is true about wardriving?
A. attackers use RF monitor mode B. the hardware is very expensive C. the software is very expensive D. their goal is simply to hijack a connection
Computer Science & Information Technology
The sender's name, address, and optional logo comprise a document's letterhead
Indicate whether the statement is true or false
Computer Science & Information Technology
A ________ is an Access database that is split into two files, one containing the back end and one containing the front end
A) dual database B) divided database C) split database D) nested database
Computer Science & Information Technology