1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kompoz [17]
3 years ago
14

Abusive behavior, which involves the use of an electronic communications device, that is degrading, humiliating, hurtful, insult

ing, intimidating, malicious, or otherwise offensive to an individual or group of individuals causing substantial emotional distress is known as which of the following?a. cyber attacking.
b. cyber harassment.
c. cyber stalking.
d. cyber texting.
Computers and Technology
1 answer:
BARSIC [14]3 years ago
7 0

B because this words degrading, humiliating, hurtful, insulting, intimidating, malicious, or otherwise offensive to an individual or group of individuals causing substantial emotional distress

You might be interested in
A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their f
Serhud [2]
Sbsushshowksjs aiaibsisjshxusbsuwjaaks
6 0
2 years ago
Three reasons Why we connect speakers to computers
ANEK [815]
1. Some computers do not have speaker therefore we connect speakers

2. Some speakers don’t have clear audio so to fix that we connect new ones

3. What do you do if your speaker inside the computer is broken..... connect new speakers
4 0
3 years ago
Read 2 more answers
I
Naily [24]

Answer:

True

Explanation:

Not(False) OR False = True OR False = True

4 0
3 years ago
The MAA is responsible on a daily basis to protect office computers and patient records and personal information from hackers. R
d1i1m1o1n [39]

Two things that I can do in order to protect these assets with the use of the computer or the internet is by first, downloading and using an antivirus software where this has the ability to protect the computer from invaders, hackers and other viruses that could get into the system of the computer. Second, making the data encrypted, so that it will be protected with a code to prevent other people who are trying to get in the data.

3 0
3 years ago
1. Sunday Times wants an analysis of the demographic characteristics of its readers. The
Lera25 [3.4K]

Answer:

GIRL

Explanation:

DALAGANG FILIPINA

14 YEARS OLD

NEED FRIENDS

6 0
2 years ago
Other questions:
  • Music voice and sound effects can all be recorded and stored on a computer as
    15·1 answer
  • A _____ is a device that not only provides surge protection, but also furnishes desktop computers and network devices with batte
    7·1 answer
  • Which is an example of a screenshot?
    7·2 answers
  • Which of the following is NOT a component of a DFD?
    8·1 answer
  • A user wants to make sure he can quickly restore his computer after a drive failure to the state it was in when Windows and all
    9·1 answer
  • How do you record yourself on a macbook pro
    9·1 answer
  • Tree diagrams are useful for
    12·1 answer
  • Label provides the code that executes if no case label is matched ​
    6·1 answer
  • _______ is a medium-range wireless network. ________ is a medium-range wireless network. Cellular radio LTE UWB Wi-Fi
    12·1 answer
  • Complete the sentence.
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!