1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kompoz [17]
3 years ago
14

Abusive behavior, which involves the use of an electronic communications device, that is degrading, humiliating, hurtful, insult

ing, intimidating, malicious, or otherwise offensive to an individual or group of individuals causing substantial emotional distress is known as which of the following?a. cyber attacking.
b. cyber harassment.
c. cyber stalking.
d. cyber texting.
Computers and Technology
1 answer:
BARSIC [14]3 years ago
7 0

B because this words degrading, humiliating, hurtful, insulting, intimidating, malicious, or otherwise offensive to an individual or group of individuals causing substantial emotional distress

You might be interested in
Why would someone need to use tools like IECacheView or MyLastSearch on a system? Do companies have the right to search a workst
natali 33 [55]

IECacheView helps a user quickly and easily access and read the cache folder of Internet Explorer. Information such as filename, content type, number of hits, expiration time, and the full path of cache filename can be accessed. With all this information, investigators can look at what users are accessing on the web. Anything accessed on IE by an employee at his or her workstation can be searched by the company. This brings us to the question; do companies have the right to search a workstation they issued to their employees using IECacheView?

In my own opinion, I honestly think that it is not right to search an employee’s workstation using IECacheView or any other tool whatsoever. Under the law, employees have reasonable rights to privacy. These rights prevent employers from searching their employees. Unless there is evidence of computer crimes or misconduct, employees have a greater expectation of privacy

6 0
4 years ago
How does applying Fontworks effects to text on an advertising flyer change the text?
Cerrena [4.2K]

Answer:A

Explanation:

5 0
3 years ago
Read 2 more answers
1.Anong uri ng application software ang iyong ginamit upang makapagtutuos ka ng datos?
ss7ja [257]

Answer:

The answer is "Microsoft Excel"

Explanation:

Please find the complete and correct question in the attached file.

It will use Microsoft Excel to calculate formulas may be put throughout every cell. Excel works for use of the readily accessible or available on-line resources.  

It can be linked to multiple files, servers, and information sources. It can also create a factory reset to allow Excel to process a data box folder, that's why it's important to learn to quantify of it's skill.

7 0
3 years ago
What process periodically validates a user’s account, access control, and membership role on inclusion in a specific group?a. Re
Gennadij [26K]

Answer: (A) Recertification

Explanation:

 Recertification is the process that simplify and also automatically re-validate the account of the target type also the member of the resource group. It is the process in which the user account are validated periodically and also control the access.

  • The policies of the re-certification basically initiate the workflow in the activity and also set the accurate notification during the process of re-certification.
  • The re-certification access is important as it enables the companies for reviewing all the external and the internal users.
  • It provide various types of benefits to the organization as it increase the security and also the re-certification accuracy.

Therefore, Option (A) is correct.

6 0
3 years ago
Which of the following is a part of a DML statement? a. CREATE b. ALTER c. DROP d. SELECT. SE_LECT
Margaret [11]

d. SELECT

"SELECT" is a part of a DML statement.

What is DML?

DML, or Data Manipulation Language, is a subset of database operations used to insert, delete, and update data. A DML is frequently a sublanguage of a larger language, such as SQL; DML includes some of the language's operators. Because some users can perform both read and write selection, selecting read-only data is closely related to and sometimes considered a component of a DML.

Structured Query Language, or SQL, is a popular data manipulation language that is used to retrieve and manipulate data in a relational database. SQL allows you to perform database operations as well as create databases. SQL performs the required tasks by using specific commands such as Create, Drop, Insert, and so on.

To know more about DML, visit: brainly.com/question/25757965

#SPJ4

8 0
1 year ago
Other questions:
  • You will use the _____
    15·2 answers
  • Which function is used to display a string value to the screen?
    8·1 answer
  • 1. Why is it important to evaluate the website on which you plan to shop? (1 point)
    7·2 answers
  • Who does Electronic waste (E-Waste) effect
    14·1 answer
  • A. What sectors are used with Foo?
    8·1 answer
  • List two advantages and two disadvantages of Satellite Based<br> Augmentation Systems
    8·1 answer
  • Examine the following declarations and definitions for the array-based implementations for the Stack and Queue ADTs. Assume that
    14·1 answer
  • What types of projects require collaboration? en360
    15·1 answer
  • Is it possible to construct a wait-free n-thread PeekableStack(2) object from an arbitrary number of atomic Stack objects and at
    11·1 answer
  • Computer programming 5
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!