____________________ often find their victims online— for instance, someone in a chat room who makes a comment or has a screen name that they do not like.
Fill in the blank(s) with the appropriate word(s).
Cyberstalkers
Computer Science & Information Technology
You might also like to view...
The main area of the desktop displays application frames, dialog boxes, and icons.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
If a clean install is performed on a hard drive with a previous install of Windows and the drive is not re-formatted during the install, where will the files from the old installation be?
A. system32 B. Windows C. Windows.old D. Program Files (Saved)
Computer Science & Information Technology
To change a tab stop from one type of tab to another, you click on the ________
A) anchor B) sizing handle C) Tab Selector D) leader
Computer Science & Information Technology
To assign a double variable d to a float variable x, you write
a. x = (long)d b. x = (int)d; c. x = d; d. x = (float)d;
Computer Science & Information Technology