An aggressive, intentional act carried out by a group or individual, using electronic forms of contact, repeatedly and over time against a victim who cannot easily defend him- or herself is known as ________

Fill in the blank(s) with the appropriate word(s).


Answer: cyberbullying

Computer Science & Information Technology

You might also like to view...

As your desktop background, you must use an approved Microsoft image

Indicate whether the statement is true or false

Computer Science & Information Technology

Where is the Show Formulas command found?

A) Formula Auditing group on the Formulas tab B) Formula Auditing group on the Data tab C) Formula Auditing group on the Developer tab D) Formula Auditing group on the Review tab

Computer Science & Information Technology

As shown in the accompanying figure, ____ the physical equipment associated with a computer.

A. computer hardware is B. computer software is C. computer programs are D. computer cables are

Computer Science & Information Technology

? ? Referring to the figure above, the box around the text "Schedule" and "Number of nights" was created with the __________ element.

A. input B. textarea C. fieldset D. field

Computer Science & Information Technology