1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ivanshal [37]
3 years ago
7

What is cyber stalking and how does it work?

Computers and Technology
2 answers:
Tcecarenko [31]3 years ago
6 0
Cyber stalking is when someone stalks them on social media sites like facebook. They try to contact you or will even try to find you.
MArishka [77]3 years ago
4 0
Cyber Stalking is a crime.They mostly post stuff about them or lies about that person that is getting stalked,they also send messages that are annoying.They stalk that person without being detected.They also spam you.
You might be interested in
Which of the following CANNOT incorporate animation
Anarel [89]
Lost the following …
8 0
1 year ago
Construct a SQL query that displays a list of colleges, their sity/state, the accrediting agency, and whether or not the school
Alex787 [66]

Answer:

SELECT college, city_state, accre_agency, distance LIMIT 10

Explanation:

Given

Table name: College

See attachment for table

Required

Retrieve top 10 college, state, agency and school distance from the table

To retrieve from a table, we make use of the SELECT query

The select statement is then followed by the columns to be selected (separated by comma (,))

So, we have:

SELECT college, city_state, accre_agency, distance

From the question, we are to select only first 10 records.

This is achieved using the LIMIT clause

i.e. LIMIT 10 for first 10

So, the complete query is:

SELECT college, city_state, accre_agency, distance LIMIT 10

6 0
3 years ago
How do you use VMware Fusion to make a Tip Calculator?
lana66690 [7]
You have to subtract the tax amount by the final amount then multiply the result by the percentage of tip that is based on the service that you received.
4 0
3 years ago
Presentation software allows users to _____.
svlad2 [7]

Answer: technolyy is a graphic igneger that allows itenas to go throught...

8 0
2 years ago
Read 2 more answers
Fern has set up a computer network for the entire building. Unfortunately, the signal strength diminishes as it reaches toward t
stepladder [879]

Answer:

Repeaters

Explanation:

As the question points out, the signal strength diminishes (attenuates) as it travels farther from the source.  Deploying a repeater at critical points throughout the building would boost the signal strength as it continues on its way.

5 0
1 year ago
Other questions:
  • How can you recognize an unsecured wireless network?
    9·1 answer
  • What is the quick key to highlighting a column?
    14·1 answer
  • List the seven basic internal components found in a computer tower
    7·1 answer
  • The Coins class was created to hold all your loose change, kind of like a piggy bank! For this exercise, you are going to simula
    15·1 answer
  • What do u say to your bf if he says sayy lesssss
    14·2 answers
  • The term ____ describes primary storage devices that are implemented as microchips, can read and write with equal speed, and can
    8·1 answer
  • In Access, it is possible to have _______________ fields, that is, fields that can contain more than one value.
    9·1 answer
  • In PowerPoint, a type of chart that, rather than showing numerical data, illustrates a relationship or logical flow between diff
    13·1 answer
  • Tech A says that gasoline vapors are lighter than air, so inspection pits do not have a fire hazard like above ground hoists. Te
    9·1 answer
  • Como se llaman las herramientas y maquinas pque utilizan para hacer cosas artesanales
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!