________ is the use of the Internet, smartphones, or other devices to send or post content intended to hurt or embarrass another person.
A. Identity theft
B. Trojan horse attack
C. Zombie apocalypse
D. Cyberbullying
Answer: D
Computer Science & Information Technology
You might also like to view...
It is difficult to detect someone who is piggybacking
Indicate whether the statement is true or false
Computer Science & Information Technology
To import slides from one presentation into another, you must have both presentations open and then drag slides from one presentation to the other presentation
Indicate whether the statement is true or false
Computer Science & Information Technology