Which of these could be considered a course of conduct directed at a specific person that causes substantial emotional distress in such person and serves no legitimate purpose?

a. Phishing
b. Browsing
c. Harassment
d. None of the above


Answer C.

Computer Science & Information Technology

You might also like to view...

The ____ content model allows an element to store any type of content.

A. OPEN B. mixed C. #PCDATA D. ANY

Computer Science & Information Technology

Which of the following is true about wardriving?

A. attackers use RF monitor mode B. the hardware is very expensive C. the software is very expensive D. their goal is simply to hijack a connection

Computer Science & Information Technology

The sender's name, address, and optional logo comprise a document's letterhead

Indicate whether the statement is true or false

Computer Science & Information Technology

A ________ is an Access database that is split into two files, one containing the back end and one containing the front end

A) dual database B) divided database C) split database D) nested database

Computer Science & Information Technology