The use of computer technology to commit terrorism crimes is called:

a. Internet terrorism
b. Electronic terrorism
c. Cyber terrorism
d. Computer terrorism

B

Business

You might also like to view...

The best use of a Gantt chart is used to show precedence requirements for a project's constituent activities

Indicate whether the statement is true or false.

Business

Discriminatory acts by the employer in compliance with a union shop provision in a collective bargaining agreement do not violate the NLRA

Indicate whether the statement is true or false

Business