1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
julsineya [31]
3 years ago
9

Which of the following is an example of cyberharassment?a. Someone sends you a credible threat that they are "out to get you."b.

Someone posts a strongly worded dissenting opinion to your post on a social network.c. An unknown individual posts photos of you, taken over several days in different locations, without you being aware that your photo was taken.d. Someone keeps sending you instant messages after you have asked them to stop.
Computers and Technology
1 answer:
Marta_Voda [28]3 years ago
7 0

Answer:

D

Explanation:

In order for it to be considered harassment, it has to happen on more than one occasion.

You might be interested in
The most likely reason that company computers connected to the Internet should use anti-virus protection software is..?
gogolik [260]
A big/potent virus could eliminate economic statuses/money, maybe bankrupting the company. 
4 0
3 years ago
To specify your preferred colors, fonts, and effects for a document, which of the following should be done?
Irina-Kira [14]

Answer: crest custom theme

Explanation:

8 0
2 years ago
Read 2 more answers
Wamna play mm2<br><br><br>imma send u my username​
SashulF [63]

Answer:

sure send it lol but how

6 0
2 years ago
En que parte del mall del rio venden tarjetas de google play en cuenca​
JulijaS [17]

chxgfk hcyskvuct auhchovuzq vuvscisv

6 0
2 years ago
What are Important advice to include about spyware, viruses, and other types of malware?
Contact [7]
They can corrupt data giving away confidential information, which in some cases is a violation of customer privacy and should be taken very seriously. Also it can slow the machine down exponentially. Some malware can delete files required for the machine to run and ultimately render it useless.
3 0
3 years ago
Other questions:
  • 1) why is software engineering considered engineering and not manufacturing?
    9·1 answer
  • What are two statements that are true about using an external hard drive for backing up data
    14·1 answer
  • You have no control over who views your social network information
    13·2 answers
  • Jessica has a balance of $2,200 on her credit card with an 18% interest rate. Her credit card company doesn’t require a minimum
    15·1 answer
  • Why do agriculture and natural resource systems vary from state to state?
    8·1 answer
  • What are the names of the four major varnas in the caste system?​
    9·2 answers
  • 8.7 lesson practice question 1
    13·1 answer
  • The function of while loop is
    14·1 answer
  • What is the significance of the Abstract section of a research paper? A. It contains important information such as the author, c
    5·1 answer
  • Windows 8 uses a(n) ________ account for easy access and storage of online files.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!