1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pishuonlain [190]
4 years ago
7

In simplest terms, cyber stalking involves the use of the Internet, e-mail, or other electronic communications devices to stalk

another person that generally involves A. harassing or threatening behavior that an individual engages in repeatedly. B. sending or forwarding sexually explicit photos, videos, or messages. C. essential cooperative reflection with evolved formation hyperbolically. D. none of the above
Computers and Technology
1 answer:
11111nata11111 [884]4 years ago
5 0

Answer:

A. ha--ssing or thr----ning behavior that an individual engages in repeatedly.

Explanation:

S - talking by an online definition is the unwanted ob-sessive attention a person gives to a specific person. So therefore, Cybers - talking can then be defined as harming behavior or unwanted or unsolicited ad-vances directed at another using the Internet and other forms of online communications such as through social media outlets like In-stagram, Face-book, Tumblr, Twitter etc and even emails and cellphones.

Cybers - talking may also include secret monitoring, identity th-eft, regular harm, tarnish of image or property, favours, or gathering personal and private information that may be used to disturb the victim. Note that this behaviour is repeatedly and compul-sive.

You might be interested in
(Solved—15 Lines) In many jurisdictions a small deposit is added to drink containers to encourage people to recycle them. In one
andrezito [222]

Answer:

JAVA program is given below.

import java.util.Scanner;

public class Main

{

   //static variables declared and initialized as required

   static float deposit1 = 0.10f;

   static float deposit2 = 0.25f;

   static float refund1;

   static float refund2;

   static int num_one_lit;

   static int num_more;

public static void main(String[] args){

    Scanner sc = new Scanner(System.in);

 System.out.print("Enter the number of containers of 1 liter or less: ");

 num_one_lit = sc.nextInt();

 System.out.print("Enter the number of containers of more than 1 liter: ");

 num_more = sc.nextInt();

 //refund computed based on user input

 refund1 = num_one_lit*deposit1;

 refund2 = num_more*deposit2;

 //displaying refund

 System.out.printf("Total refund amount for containers of 1 liter or less is $%.2f %n", refund1);

 System.out.printf("Total refund amount for containers of more than 1 liter is $%.2f %n", refund2);

}

}

OUTPUT

Enter the number of containers of 1 liter or less: 5

Enter the number of containers of more than 1 liter: 2

Total refund amount for containers of 1 liter or less is $0.50  

Total refund amount for containers of more than 1 liter is $0.50

Explanation:

1. Variables are declared at class level hence declared as static.

2. Variables holding deposit also initialized with the given values.

3. User input is taken for the number of containers in both categories.

4. The total value of refund is computed using the given values and user entered values.

5. The total refund is displayed to the user for both categories.

6. To display two decimal places always, variables to hold deposit and refund are declared as float.

7. The keywords used for decimals are %.2f %n. The %.2f keyword indicates two decimal places to be displayed in float variable, %n indicates a numeric value is to be displayed.

8. The printf() method is used to display the formatted output for refund amount.

9. The keywords used to display the formatted output is derived from C language.

10. All the code is written inside class and execution begins from the main() method.

4 0
4 years ago
When a user stores data in "the cloud", the data is stored on the user's premise in what is called a "cloud server"?
bija089 [108]
I'm pretty sure that's false  :0
8 0
3 years ago
Write a C Program to Print the initial letter of Name Ferdous
Murrr4er [49]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The question is about writing a C program that prints the initial letter of Name Ferdous.

Therefore, below is the given complete code that prints the first letter of the name Ferdous.

<em>#include <stdio.h> </em><em>/*import strandard input/output library*/</em>

<em>#include<string.h></em><em> /*import string library to handle string type of data*/</em>

<em> </em>

<em>int main(void) </em><em> /*started the program execution- program entry point*/</em>

<em>{ </em>

<em>char *str = "Firdous";</em><em>   /*char to pointer str contains string "Firdous"*/</em>

<em>int len = strlen(str);  </em><em> /*this line of code is not neccary, but if you print other character for example last character of the name then you can use it*/</em>

<em>printf("First Letter of the name is: %c", str[0]); </em><em>  /*print first letter of the name*/</em>

<em>} </em><em>  /**program terminated*/</em>

5 0
3 years ago
Why is it hard for some people to keep a promise even one that they make to themselves​
tresset_1 [31]

Answer:

Awww what happened? Sometimes its hard for me to keep a promise.

Explanation:

7 0
3 years ago
Read 2 more answers
Complete the steps to evaluate the following
kirill115 [55]

Answer:

log base 3a= -0.631.log a/3 base 3

Now, -log m= log 1/m

hence,

log base 3a= 0.631.log 3/a base 3

log base 3a/log 3/a base 3 =0.631

log base 3 ( a.3/a) =.631 since, log m/logn =log n(m)

log base 3 3=0.631

Hence, answer is log base 3 3=0.631

Explanation:

Please check the answer section.

3 0
3 years ago
Read 2 more answers
Other questions:
  • What type of devices are a keyboard and a mouse?
    7·1 answer
  • This operating system was used by individual computers and required users to type commands.
    7·2 answers
  • What are two reasons for using layered protocols? what is one possible disadvantage of using layered protocols?
    13·1 answer
  • The person who Oversee the direct work of employees and is responsible for the day-to-day tasks the employees complete is likely
    7·2 answers
  • A plaintiff can bring a claim for intentional infliction of emotional distress when all but which of the following takes place:
    9·2 answers
  • It's fill the gap homework
    7·1 answer
  • Need help asap<br> give the correct answer!!
    15·2 answers
  • PYTHON
    8·1 answer
  • Explain why microcomputers are installed with TCP/IP protocols?​
    15·1 answer
  • Hand tools are generally classified based on :​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!