The use of information technologies to corrupt or destroy an enemy's information and industrial infrastructure is called ________.
a. pod slurp
b. digital divide
c. electronic warfare
d. information warfare
Ans: d. information warfare
Computer Science & Information Technology
You might also like to view...
Even after a file is emptied from the Recycle Bin, there remains an entry for that file in the MFT
a. True b. False
Computer Science & Information Technology
In Microsoft Office 2016, all of the commands on the Mini toolbar appear nowhere in the ribbon of an application.?
Answer the following statement true (T) or false (F)
Computer Science & Information Technology