Actions ranging from creating viruses to disrupting computer networks are often referred to as:
A. scareware
B. social engineering
C. cybercrimes
D. data mining
Answer: C
Computer Science & Information Technology
You might also like to view...
Encrypting a file will digitally inspect information
Indicate whether the statement is true or false
Computer Science & Information Technology
The _____ is the small black square located in the lower-right corner of the heavy border around the active cell.
A. selection handle B. sizing handle C. fill handle D. copy handle
Computer Science & Information Technology