________ is the use of the Internet, smartphones, or other devices to send or post content intended to hurt or embarrass another person.

A. Identity theft
B. Trojan horse attack
C. Zombie apocalypse
D. Cyberbullying

Answer: D

Computer Science & Information Technology

You might also like to view...

It is difficult to detect someone who is piggybacking

Indicate whether the statement is true or false

Computer Science & Information Technology

To import slides from one presentation into another, you must have both presentations open and then drag slides from one presentation to the other presentation

Indicate whether the statement is true or false

Computer Science & Information Technology