FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
When technology is used to embarrass, threaten, harass or target another person, what do we call this practice?
A
Sexting
B
Cybersafety
C
Netiquette
D
Cyberbullying
Explanation: 

Detailed explanation-1: -Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person. Online threats and mean, aggressive, or rude texts, tweets, posts, or messages all count. So does posting personal information, pictures, or videos designed to hurt or embarrass someone else.

Detailed explanation-2: -Cyberbullying can include: Sending mean texts or IMs to someone. Pranking someone’s cell phone. Hacking into someone’s gaming or social networking profile.

Detailed explanation-3: -Which would be a responsible use of technology used by victims of cyberbullying? changing passwords and screen names regularly.

Detailed explanation-4: -Cyberbullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else. It can include sharing personal or private information about someone else causing embarrassment or humiliation. Some cyberbullying crosses the line into unlawful or criminal behavior.

There is 1 question to complete.