Technology Applications

Edit Answers
EFOWETTEUQITENDZEKPAEFWON CROFBZPRETENSEODAPHBNCMSF EELUFGYCJOTNGZLEDZNCYMJFV KVEDODNGRANSOMWAREFTTMXQM QBIPPFRIDMJWINYDLJLHIJLHT WUZWGIXYKKLQCPAAHXAHTVAKT BZSESURIVLNSTNHIRTMNNPKNZ CKHXLHXXZRAYSIWDEWITECDGC LMDIHOULYTWTESNSOINVDMSQG KCLYXGYZFUWHSKPPNDGBIMGKN SNRBEOFNEKAWAEVVSPJALFMWI EOZDHBEGIOSOEEAHMZSNANPBK OYFINPCHWADCJSTBEPEUTIBYC HXSTEKEGWXHWIHPSXDSOIWAPA FACKWGAKGWEOPAMDCVMKGLCLH WHSIYACNJONHGRUDLTXYIFIQJ TEPHGCRPLOVPQARCURRWDEBLT HDYESUHEFQUFLSAHSRNRSESQD ORWQDYBPPDPKSSWCIATBEZUHI GRAUYGRSSIVKGMUXOIQUOEYDZ JHRXSIYNSNRKIEOPNTPHZGPIM NSEQVXMSPHWALNCVXSDLEXZFM IHPAGIOIXBMGCTETIQUETTEDJ PSCCFGWVAXEDJYXEXMBJJOJAA GYQYPMALWAREYLURAVWXGFDXU
1.
Harassment
2.
Exclusion
3.
Flaming
4.
HateSpeech
5.
Stalking
6.
Pretense
7.
Gossip
8.
Lies
9.
Hacking
10.
SoftwarePiracy
11.
InvasionOfPrivacy
12.
Malware
13.
Viruses
14.
Ransomware
15.
Spyware
16.
DigitalIdentity
17.
Etiquette
18.
Netiquette