____________________ often find their victims online— for instance, someone in a chat room who makes a comment or has a screen name that they do not like.
Fill in the blank(s) with the appropriate word(s).
Cyberstalkers
Computer Science & Information Technology
You might also like to view...
If a clean install is performed on a hard drive with a previous install of Windows and the drive is not re-formatted during the install, where will the files from the old installation be?
A. system32 B. Windows C. Windows.old D. Program Files (Saved)
Computer Science & Information Technology
To assign a double variable d to a float variable x, you write
a. x = (long)d b. x = (int)d; c. x = d; d. x = (float)d;
Computer Science & Information Technology
To change a tab stop from one type of tab to another, you click on the ________
A) anchor B) sizing handle C) Tab Selector D) leader
Computer Science & Information Technology
The main area of the desktop displays application frames, dialog boxes, and icons.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology