1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tomtit [17]
3 years ago
12

The repeated use of electronic communications, such as chat rooms and email, to seek out, harass, or frighten someone is called

__________.
Computers and Technology
1 answer:
pickupchik [31]3 years ago
5 0

Answer:

CyberStalking

Explanation:

Stalking over the internet carried out . it target individuals or organisation to stalk and harass

You might be interested in
Which member of the restaurant and food/beverage service career is mostly likely to plan menus and direct worker
kumpel [21]

What are the options for the question

5 0
3 years ago
Read 2 more answers
Develop Swimlane Activity diagram for Assignment announcement and submission system.
ArbitrLikvidat [17]
  • Using cases can be visualized in greater detail in this report of an activity diagram.
  • In other words, it's a behavioral diagram that regulates the number of actions via systems. They can also be used to show sequences of activities in business operations.
  • UML Activity Diagrams A business process can be examined to determine its flow and demands that use these tools.

The steps to this question can be defined as follows:

For step 1:

  • The task is to decide the action steps depending upon your use case.

For step 2: Identify all parties involved

  • If you know whoever the actors are, it's easier to determine the acts they are liable for.

For step 3: Establish a movement among activities

  • Change the priority in which the action is required by studying the flowchart.
  • If you need to add any branches to the graph, note the conditions that must be met for certain processes to take place.
  • Furthermore, do you even have to finish some tasks before moving onto someone else?

For step 4: Adding swimlanes

  • We know who is to blame for each act. It's time to assign everyone a swimming lane and group every action they are accountable for under it.
  • Some many activities and actions make up your sales system or process.

Please find the diagram in the attachment file.

Learn more:

Assignment submission: brainly.com/question/11714037

8 0
3 years ago
When you divide a picture into thirds, how many parts do you end up with? *
lara31 [8.8K]

Answer:

3

Explanation:

6 0
3 years ago
Read 2 more answers
A citizen of any group both
erastovalidia [21]

Answer:

Rights and Responsibilities

Explanation:

4 0
2 years ago
What is a data broker?
AleksAgata [21]

Answer:

The correct option is a.

A business that collects personal information about consumers and sells that information to other organizations.

Explanation:

Data brokers, also known as data suppliers, data fetchers, information brokers, or even data providers are businesses or companies (even individuals) that, on the most basic level, source and aggregate data and information (mostly information that are meant to be confidential or that are in the real sense difficult to get) and then resell them to third parties. These third parties could be other data brokers.  

They collect data and information from a wide range of resources and sources - offline and/or online e.g web access history, bank details, credit card information, official records (such as birth and marriage certificates, driver's licenses).  

Brokers can steal round about any information. Examples of information that brokers legally or illegally steal are full name, residential address, marital status, age, gender, national identification number, bank verification number. Brokers and hackers are siblings.

A couple types of data brokers are:

1. Those for fraud detection

2. Those for risk mitigation  

Hope this helps!

6 0
3 years ago
Other questions:
  • Suggest two other subtasks that may be performed in a dice game?
    15·2 answers
  • Which reading strategy refers to reading only the key words and phrases?
    13·2 answers
  • Your browsing the Internet and realize your browser is not responding which of the following will allow you to immediately exit
    14·2 answers
  • Why is drafting important in every industry
    6·1 answer
  • Write a program that uses for loops to perform the following steps: Prompt the user to input two integers: firstNum and secondNu
    15·1 answer
  • Write the definition of a class Clock. The class has no constructors and three instance variables. One is of type int called hou
    12·1 answer
  • Help!!!!!!!!!!!!!!!!!
    11·1 answer
  • Ann wants to save her presentation so she can work on it later. Which device on her computer can store this data long term?
    15·2 answers
  • Rick is linking different pages in his website. Match the value of the attribute to its meaning to enable Rick to choose the mos
    13·1 answer
  • The most common clefs for high notes are what?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!