Repeated threats or other harassment carried out online between adults is referred to as ____.

A. cyberstalking
B. computer sabotage
C. cyberterrorism
D. phishing

Answer: A

Computer Science & Information Technology

You might also like to view...

While a ToolTip is being displayed, it’s appearance remains the same.

What will be an ideal response?

Computer Science & Information Technology

What can be used as a type of "fingerprint" for an object, due to the fact that it is unique?

A. property B. hash code C. derived code D. new property

Computer Science & Information Technology