The NSA's Terrorist Surveillance Program includes ________

a. in-terminal screening of air travelers
b. license review of commercial airlines
c. collection of telephone call information
d. development of international treaties

Answer: c

Computer Science & Information Technology

You might also like to view...

Hashing functions require the use of keys.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Task dependencies are by default ____ dependencies.

A. FS B. SF C. SS D. FF

Computer Science & Information Technology