Terrorists can use IT to ________.

destroy utilities
finance their terrorism
Both destroy utilities and finance their terrorism
Neither destroy utilities nor finance their terrorism

Both destroy utilities and finance their terrorism

Computer Science & Information Technology

You might also like to view...

If no memory is available malloc returns a(n) __________ pointer.

a) self b) NULL c) void d) empty

Computer Science & Information Technology

The _____________ proxy server software is available for use on the UNIX / Linux platform.?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology