_____ is the repeated use of electronic communications to harass, threaten, or frighten someone.
A. Social networking
B. Cyberbullying
C. Cyberstalking
D. Online interaction
E. Cyberinteraction
Answer: C
You might also like to view...
During family enrichment weekends, families:
a. actively confront and force one another to examine problems and faulty solutions. b. work together to improve family life through participation in learning experiences or lectures. c. dramatize their problems by acting them out as members in a play. d. learn about support services that can help them through their problems.
What are the major sources of crime and victimization data in the United States?
What will be an ideal response?
Answer the following statement(s) true (T) or false (F)
1. Success stories about program participants are generally suspect and therefore of little value in program evaluation. 2. The gold standard of program evaluation has traditionally been a posttest and retrospective pretest design. 3. Vision statements should be static and stable over time. 4. For a beginning program, understanding who is receiving services may be some of the most helpful feedback to obtain.
The English term democracy comes from which language?
A. Greek B. Roman C. Egyptian D. French