1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tomtit [17]
4 years ago
12

The repeated use of electronic communications, such as chat rooms and email, to seek out, harass, or frighten someone is called

__________.
Computers and Technology
1 answer:
pickupchik [31]4 years ago
5 0

Answer:

CyberStalking

Explanation:

Stalking over the internet carried out . it target individuals or organisation to stalk and harass

You might be interested in
A command, such as a button or keyboard shortcut, that performs a specific task is known as a
Oxana [17]

Answer:

Macro

Explanation:

7 0
3 years ago
Read 2 more answers
Select the correct answer.
swat32
Answer : C project planning
5 0
4 years ago
An alarm clock draws 0.5 A of current when connected to a 120 volt circuit. Calculate its resistance.
mixas84 [53]

Answer:

120 vpm

Explanation:

8 0
3 years ago
In what software development model does activity progress in a lock-step sequential process where no phase begins until the prev
den301095 [7]

Answer:

"Waterfall" is the correct answer for the above question.

Explanation:

  • The Waterfall model is a model which is the first model recognized by some scientists is used to states some rules to develop the software. It is based on the phases of the SDLC. The SDLC is the collection of phase that is used in software development.
  • The waterfall model moves like water moves. It means any next phase starts if the previous phase is completed and the user can not move into previous steps of the model.
  • This is also asked by the question. Hence the answer is the waterfall model.
5 0
3 years ago
Write a short quiz program which asks three true/false questions and stores the user's answers as booleans. At the end the progr
viva [34]

this answering question interface is bleh

8 0
3 years ago
Other questions:
  • Write a program that reads a list of words. Then, the program outputs those words and their frequencies. The input begins with a
    13·1 answer
  • The collection of all possible vulnerabilities that could provide unauthorized access to computer resources is called the:
    12·1 answer
  • A law office has been leasing dark fiber from a local telecommunications company to connect a remote office to company headquart
    14·1 answer
  • What does it mean to be self demanding?
    12·1 answer
  • Which statement will properly start the main() function? def main(): def Main def main# def main[]
    14·2 answers
  • Using this tool to help you to visualize your slides and develop your content
    13·1 answer
  • How are IP addresses usually written?
    7·1 answer
  • Some people recommend deleting social media accounts because of the troubling legal and ethical implications of social media. Do
    9·1 answer
  • Given the following statement, what is the value of myExample?
    13·1 answer
  • Pls help I will give points
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!