Black Friday discounts!
Why choose just one? Take ALL of them for a ridiculous price.
Onlinecourses55 - Start page
Home
LOGIN
REGISTER
LOGIN
REGISTER
Seeker
Test What is cyberstalking or cyberstalking?
Agenda
QUESTION 1: What key component defines cyberstalking?
The credible threat of physical harm or safety in the real world
The use of mild insults
Bad manners
The use of emojis
QUESTION 2: What tactic does the cyberstalker use to find out where the victim is?
Asking your friends
Lucky guessing
Obsessive monitoring and surveillance of online activity
Looking into a crystal ball
QUESTION 3: What is "Doxing" as a cyberstalking tactic?
Deleting data from the computer
Collecting and publishing private information (address, phone number) to facilitate harassment
Sending gifts home
Impersonating the victim to humiliate the victim
QUESTION 4: What is the legal status of cyberstalking in most countries?
A minor offense
A misunderstanding
A practical joke
A felony (classified as stalking)
QUESTION 5: What is cyberstalking strongly linked to in adults?
With ex-partners and gender violence
With labor problems
Financial debts
With sports disputes
6th QUESTION: What can a stalker do in extreme cases using spyware?
Improve cell phone performance
Delete junk files
Installing software to read messages and activate the camera/microphone
Updating the operating system
7th QUESTION: What is the implicit message of the stalker to the victim?
I love you very much
I'm watching you, I know where you are and I can hurt you
I want to be your friend
I don't care about you
8th QUESTION: What effect does the cyberstalker seek to provoke in the victim?
Laughter and fun
Boredom
Reasonable and credible fear for your safety
Curiosity
Send
This test is only available to students who have purchased the course
INCORRECT QUESTIONS
Previous
Next
Are there any errors or improvements?
Where is the error?
What is the error?
Send