____ is the premeditated disruption of computers and networks.
A. Cyberterrorism
B. Hacking
C. Spamming
D. War driving
Answer: A
Computer Science & Information Technology
You might also like to view...
The use of two or more criteria on the same row is known as a:
A) wildcard criteria. B) criteria range. C) compound criteria. D) conditional criteria.
Computer Science & Information Technology
__________ controls access based on comparing security labels with security clearances.
A. MAC B. DAC C. RBAC D. MBAC
Computer Science & Information Technology