Actions ranging from creating viruses to disrupting computer networks are often referred to as:

A. scareware
B. social engineering
C. cybercrimes
D. data mining

Answer: C

Computer Science & Information Technology

You might also like to view...

Encrypting a file will digitally inspect information

Indicate whether the statement is true or false

Computer Science & Information Technology

The _____ is the small black square located in the lower-right corner of the heavy border around the active cell.

A. selection handle B. sizing handle C. fill handle D. copy handle

Computer Science & Information Technology