Which of the following involves using the Internet to harass, threaten, or intimidate another person?
a. Cyberstalking
b. Looping
c. Phishing
d. Licensing
Answer A.
Computer Science & Information Technology
You might also like to view...
You write a(n) ________ letter in response to a job opening that exists
Fill in the blank(s) with correct word
Computer Science & Information Technology
A note inserted into the text of a research paper that refers the reader to a source in the bibliography
a. Footnotes b. Citation c. Bibliography
Computer Science & Information Technology