Repeated threats or other harassment carried out online between adults is referred to as ____.
A. cyberstalking
B. computer sabotage
C. cyberterrorism
D. phishing
Answer: A
Computer Science & Information Technology
You might also like to view...
While a ToolTip is being displayed, it’s appearance remains the same.
What will be an ideal response?
Computer Science & Information Technology
What can be used as a type of "fingerprint" for an object, due to the fact that it is unique?
A. property B. hash code C. derived code D. new property
Computer Science & Information Technology