Harassment others via the Internet, such as through email, text messaging, a social networking site, or other online communications method, is referred to as _________.
A. cyberbullying
B. cybersquatting
C. net spoofing
D. larceny spoofing

Fill in the blank(s) with the appropriate word(s).

cyberbullying

Rationale: Bullying others via the Internet, such as through email, text messaging, a social networking site, or other online communications method, is referred to as cyberbullying. Cyberbullying can take place openly, but often it occurs anonymously, such as a bully sending messages via a hacked social media or email account, or a bully hacking a victim's social media account and changing the content. See 6-5: Cyberstalking and Other Personal Safety Concerns

Computer Science & Information Technology

You might also like to view...

Company policy requires employees to change their passwords every 60 days. The security manager has verified all systems are configured to expire passwords after 60 days. Despite the policy and technical configuration, weekly password audits suggest that some employees have had the same weak passwords in place longer than 60 days. Which of the following password parameters is MOST likely misconfigured?

A. Minimum lifetime B. Complexity C. Length D. Maximum lifetime

Computer Science & Information Technology

Establishing a method to erase or clear memory is an example of securing which of the following?

A. Data in transit B. Data at rest C. Data in use D. Data in motion

Computer Science & Information Technology