The use of information technologies to corrupt or destroy an enemy's information and industrial infrastructure is called ________.

a. pod slurp
b. digital divide
c. electronic warfare
d. information warfare

Ans: d. information warfare

Computer Science & Information Technology

You might also like to view...

Even after a file is emptied from the Recycle Bin, there remains an entry for that file in the MFT

a. True b. False

Computer Science & Information Technology

In Microsoft Office 2016, all of the commands on the Mini toolbar appear nowhere in the ribbon of an application.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology