Using computer systems to launch a terrorist attack is an example of which of the following?
a. Computer-based espionage
b. Information warfare
c. Cyber terrorism
d. Hacktivism
ANS: C
Computer Science & Information Technology
You might also like to view...
Which of the following is NOT true about editing Excel spreadsheets with Quickoffice?
A) You can use a variety of functions such as SUM, COUNT, IF, and DATE and TIME functions. B) Quicksheet offers all the same functionality as Excel. C) You can enter text. D) You can enter simple formulas.
Computer Science & Information Technology
Your instructor can use up to 10 percent of a copyrighted work, or up to 1,000 words, may be used, whichever is less
Indicate whether the statement is true or false
Computer Science & Information Technology