1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
julsineya [31]
2 years ago
9

Which of the following is an example of cyberharassment?a. Someone sends you a credible threat that they are "out to get you."b.

Someone posts a strongly worded dissenting opinion to your post on a social network.c. An unknown individual posts photos of you, taken over several days in different locations, without you being aware that your photo was taken.d. Someone keeps sending you instant messages after you have asked them to stop.
Computers and Technology
1 answer:
Marta_Voda [28]2 years ago
7 0

Answer:

D

Explanation:

In order for it to be considered harassment, it has to happen on more than one occasion.

You might be interested in
A computer that delivers requested web pages to your computer or mobile device is a(n) _____.
yaroslaw [1]

Answer:

Web Server

A web server is server software, or hardware dedicated to running this software, that can satisfy client requests on the World Wide Web. A web server can, in general, contain one or more websites. A web server processes incoming network requests over HTTP and several other related protocols.

6 0
3 years ago
A shop will give discount of 10% if the
wlad13 [49]

Answer:

10%÷100 it is correct answer

6 0
2 years ago
Three periods after a menu item (…) mean that clicking that command will open
otez555 [7]
<h2>Answer:</h2>

Option B: a dialog box

Three periods after a menu item (…) mean that clicking that command will open a dialog box.

<h2>Explanation:</h2>
  • The three periods after items in menus are given a special name "ellipsis".
  • As the space for an item name is less for complete description, ellipsis is used.
  • Ellipsis lead to dialog box that elaborates the function of the item.
  • The person can then select the item depending on the need as well as reject it completely.
  • So in other words, ellipsis allow users to understand the command completely and choose what to do next.

<h3>I hope it will help you! </h3>
8 0
3 years ago
These are Spealized graphics programs gor editing or modifying digital photographs
lisov135 [29]
They fall under the category of “Photo Editing Software” or “Image Manipulation Software”
8 0
2 years ago
An online electronic journal is known as a _____.
fredd [130]

Answer: as an e-journals

Explanation:

8 0
2 years ago
Other questions:
  • Develop an sec (single error correction) code for a 16-bit data word. generate the code for the data word 0101000000111001. show
    7·2 answers
  • A block style business letter is
    14·1 answer
  • In python:
    14·1 answer
  • ________ is a model of computing in computer processing, storage, software, and other services which are provided as a shared po
    9·1 answer
  • //Display message Module main () // Declare variables Declare real weight Declare real shipping //Get package weight Call getWei
    7·1 answer
  • What two statements about IPv6 addresses are true? This task contains the radio buttons and checkboxes for options. The shortcut
    7·1 answer
  • During system testing, developers test the program in an environment that is very similar to how the program will eventually be
    11·2 answers
  • Assume that you have the business data in various sources such as Excel, .csv, text files and Access, Oracle databases. Write th
    9·1 answer
  • 300134223+304532264440=
    11·2 answers
  • A(n) _______ attack attempts to make a server or network unavailable to serve legitimate users by flooding it with attack packet
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!