1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pishuonlain [190]
4 years ago
7

In simplest terms, cyber stalking involves the use of the Internet, e-mail, or other electronic communications devices to stalk

another person that generally involves A. harassing or threatening behavior that an individual engages in repeatedly. B. sending or forwarding sexually explicit photos, videos, or messages. C. essential cooperative reflection with evolved formation hyperbolically. D. none of the above
Computers and Technology
1 answer:
11111nata11111 [884]4 years ago
5 0

Answer:

A. ha--ssing or thr----ning behavior that an individual engages in repeatedly.

Explanation:

S - talking by an online definition is the unwanted ob-sessive attention a person gives to a specific person. So therefore, Cybers - talking can then be defined as harming behavior or unwanted or unsolicited ad-vances directed at another using the Internet and other forms of online communications such as through social media outlets like In-stagram, Face-book, Tumblr, Twitter etc and even emails and cellphones.

Cybers - talking may also include secret monitoring, identity th-eft, regular harm, tarnish of image or property, favours, or gathering personal and private information that may be used to disturb the victim. Note that this behaviour is repeatedly and compul-sive.

You might be interested in
When you merge business letters, how many total documents will you have when you are finished with the merge process?
dlinn [17]

Answer:

You will have one letter for every receiver on the table.

Explanation:

In a new Microsoft Word paper, click on the Mailings label, and in the Start Mail Merge collection, agree on Start Mail Merge.

Agree on Step-by-Step Mail Merge Wizard.

Choose your paper model.

Choose the opening paper.

Preferred beneficiaries.

Address the report and attach your custom entries.

6 0
3 years ago
Read 2 more answers
9. In Electronic Codebook (ECB): a. The message is broken into independent blocks which are encrypted b. The message is broken i
DaniilM [7]

Answer:

The correct answer is letter "A": The message is broken into independent blocks which are encrypted.

Explanation:

There are five (5) main forms of encryption: <em>Electronic Code Book (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Output Feedback (OFB)</em>. Electronic Code Book (ECB) is the simplest of all of them. Using this method to encrypt information implies dividing a message into two parts to encrypt each block independently. ECB does not hide patterns effectively because the blocks are encrypted using identical plaintexts.

8 0
4 years ago
A user wants to visualize a highly complex 3D model using a Virtual Reality headset.
Lyrx [107]

The best way for an end user to visualize a highly complex 3D model using a Virtual Reality headset is to: A) use any headset and increase the bandwidth of the Wi-Fi connection.

<h3>What is Virtual Reality (VR)?</h3>

Virtual Reality (VR) can be defined as a computer technology through which virtual images of any physical environment (realities) and human-machine interactions are displayed, especially through the use of various computer technologies and wearables.

<h3>The elements of Virtual Reality (VR).</h3>

Some of the elements of Virtual Reality (VR) include the following:

  • Life interaction
  • Self projection
  • Telexistence
  • 3D space or model.

In this context, we can infer and logically deduce that Virtual reality is a  computer technology which is designed and developed to simulate a three-dimensional (3D) environment through which end users can explore and interact.

In conclusion, the best way for an end user to visualize a highly complex three-dimensional (3D) model using a Virtual Reality headset is to use any headset and increase the bandwidth of the Wi-Fi connection.

Read more on Virtual Reality here: brainly.com/question/26705841

#SPJ1

6 0
2 years ago
Which element of a business document provides additional information but is not a part of the body of the text?
Vaselesa [24]

The subject is generally covered inside the body of text, so that one's out.

The footer is a completely separate part of the document, specifically the bottom-most portion of the page, but let's look at the others.

The salutation is placed at the beginning of the body of text.

And your closing note is placed at the end of the body of text.

So, the best answer would be b. footer.

3 0
4 years ago
Read 2 more answers
Companies typically like to design scorecards that fit their business and industry. As a result there are now software applicati
Leya [2.2K]

Answer:

Web-based balanced scorecard applications are sometimes referred to as performance dashboards.

Explanation:

Performance dashboards are common management tools used to gauge performance and enable business people to measure, monitor, and manage the key activities and processes needed to achieve business goals.

6 0
3 years ago
Other questions:
  • Which disk drive type contains a magnetic HDD with onboard flash memory serving as a non-volatile cache?
    6·1 answer
  • Which element of a business document provides additional information but is not a part of the body of the text?
    13·2 answers
  • How do I sign into raterhub on my phone and my mobile device at the same time to complete phase 2 of my raters exam for sykeshom
    10·1 answer
  • Analyze the following code. Which of the following statements is correct?
    9·1 answer
  • Visual culture is an area of academic study that deals with the totality of images and visual objects produced in ____________,
    6·1 answer
  • What major criteria must a product or process meet in order to be considered emerging technology?
    6·1 answer
  • Which role involves designing and creating advertisements for marketing purposes?
    14·1 answer
  • Suppose the message 111010 is to be transmitted (beginning with the leftmost bit) using
    6·1 answer
  • Suppose you are working in a computer lab during the work you are facing window failure or other technical issues.How you will s
    12·1 answer
  • What are two advantages of a pay-for-use online conferencing service compared to a free service? (Choose two)
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!