Using the Internet, e-mail, or other electronic communication to harass or pursue another person is called:
A) ?cyberbullying.
B) ?cyber tracking.
C) ?cyberstalking.
D) ?cyber trailing.
E) ?trolling.
C
You might also like to view...
A search warrant allows an investigator to search a hard drive for evidence of fraud. During the analysis, the investigator discovers child pornography on the hard drive. The child pornography may be seized under which doctrine?
a. Exigent circumstances b. Searches by private citizens c. Plain view d. Search incident to arrest
Drug addiction and alcoholism are not punishable as crimes because:
a. there is no sufficient act involved to constitute a crime. b. they are illnesses. c. to do so would violate due process. d. the sufferers act of their own free will.
Mary McIntosh identified four kinds of organizations of professional criminals. List and discuss those four kinds of organizations. Be sure to give examples of each
What will be an ideal response?
The set of rules and values that develop within the prison social system and guide prisoners' behavior is called:
A. jailing. B. the inmate code. C. gleaning. D. machismo. E. the prisoners' law.