Answer:
CyberStalking
Explanation:
Stalking over the internet carried out . it target individuals or organisation to stalk and harass
Answer:
input device
Explanation:
any hardware device that allows users to enter programs, data, and commands into a computer system
Answer:
include iPods, PlayStations, Xbox, TiVo, and WRT54G.
Explanation:
Answer:
a. file-naming conventions
Explanation:
File names need to follow certain criteria and constraints. Examples include:
- File names must not start with special symbols.
- File names can consist of letters,digits and special characters such as _.
- File name can contain an extension after a dot sign.
- File names must not be duplicates of an existing file.
Such constraints form part of file-naming conventions.
- file-path represents the complete path to the file in the directory structure.
- disk partition segments a hard disk into multiple volumes.
- file-path starts from the root directory and spans one or more subdirectories to the location of the actual file.
Can prove they are not infringing on copyright