Which of the following involves using the Internet to harass, threaten, or intimidate another person?

a. Cyberstalking
b. Looping
c. Phishing
d. Licensing

Answer A.

Computer Science & Information Technology

You might also like to view...

You write a(n) ________ letter in response to a job opening that exists

Fill in the blank(s) with correct word

Computer Science & Information Technology

A note inserted into the text of a research paper that refers the reader to a source in the bibliography

a. Footnotes b. Citation c. Bibliography

Computer Science & Information Technology