Using computer systems to launch a terrorist attack is an example of which of the following?

a. Computer-based espionage
b. Information warfare
c. Cyber terrorism
d. Hacktivism

ANS: C

Computer Science & Information Technology

You might also like to view...

Which of the following is NOT true about editing Excel spreadsheets with Quickoffice?

A) You can use a variety of functions such as SUM, COUNT, IF, and DATE and TIME functions. B) Quicksheet offers all the same functionality as Excel. C) You can enter text. D) You can enter simple formulas.

Computer Science & Information Technology

Your instructor can use up to 10 percent of a copyrighted work, or up to 1,000 words, may be used, whichever is less

Indicate whether the statement is true or false

Computer Science & Information Technology