1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
julsineya [31]
3 years ago
9

Which of the following is an example of cyberharassment?a. Someone sends you a credible threat that they are "out to get you."b.

Someone posts a strongly worded dissenting opinion to your post on a social network.c. An unknown individual posts photos of you, taken over several days in different locations, without you being aware that your photo was taken.d. Someone keeps sending you instant messages after you have asked them to stop.
Computers and Technology
1 answer:
Marta_Voda [28]3 years ago
7 0

Answer:

D

Explanation:

In order for it to be considered harassment, it has to happen on more than one occasion.

You might be interested in
What function would you use to calculate the total interest paid for the first year of a mortgage?.
WITCHER [35]

Answer:

To calculate the total interest paid for the first year of a mortgage, the formula M = [P.r (1+r)n] / [(1+r)n-1] × 12 can be used.

Explanation:

3 0
2 years ago
List 3 characteristics of the ideal encryption scheme
JulsSmile [24]
Three characteristics of an ideal encrytion scheme are:
1. The encryption sheme should be strong: the algorithm is imprevious to direct attack and attempts are derived.
2. The encryption scheme should create unique ciphertext from the same plaintext for each key permutation, among other traits.
3. It should take at least millions of years to break ideal encryption scheme, based on mathematical predictions.
6 0
3 years ago
Read 2 more answers
Which one of the following devices would you choose to meet those requirements?
tensa zangetsu [6.8K]
What are the requirements
5 0
2 years ago
Read 2 more answers
Whatis Level of node ‘46’?
Ierofanga [76]

Answer:

6

Explanation:

The  tree is the hierarchical structure in the data structure, it has the properties like nodes, height, level etc.

the formula for calculating the maximum number of node at the given level.

number of nodes = 2^{l-1}

here, l is the level of node.

in the question the number of node is 46.

Substitute in the formula:

2^{l-1}=46\\ l-1=log_{2}46\\ l=5.5235+1\\l=6.6235

The Approx. value of level is 6

5 0
3 years ago
Which piece of personal information do websites often require users to enter?
Olin [163]

Answer:

Your Social Security Number

Explanation:

3 0
3 years ago
Other questions:
  • Which loan type requires you to make loan payments while you’re attending school?
    9·1 answer
  • In each iteration, selection sort (small) places which element in the correct location?
    9·1 answer
  • The communication channel used in IMC must rev: 12_06_2018_QC_ CDR-223 Multiple Choice match the traditional channel used in tha
    14·1 answer
  • Write a program that print "Censored" if userInput contains the word "darn", else print userInput. End with newline.
    8·1 answer
  • Anyone wanna play Smash Ultimate. I'm a Link main (that doesn't mean I camp, thats young link) who plays competitve with legal s
    8·1 answer
  • What is an 8086 microprocessor used for
    13·1 answer
  • What are the classifications of computer
    9·1 answer
  • 15. Feelings (maps, coins, clues, etc.) and the invisClue books were some innovative ways used to keep __________ players engage
    8·2 answers
  • Common names for computer-based information systems are transaction processing, management information, ________, and executive
    5·1 answer
  • During prereading, it is not important to pay attention to visual aids. please select the best answer from the choices provided
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!