____ is the premeditated disruption of computers and networks.

A. Cyberterrorism
B. Hacking
C. Spamming
D. War driving

Answer: A

Computer Science & Information Technology

You might also like to view...

The use of two or more criteria on the same row is known as a:

A) wildcard criteria. B) criteria range. C) compound criteria. D) conditional criteria.

Computer Science & Information Technology

__________ controls access based on comparing security labels with security clearances.

A. MAC B. DAC C. RBAC D. MBAC

Computer Science & Information Technology