_______ is a form of crime that targets a computer system to acquire information stored on that computer system, to control the target system without authorization or payment, or to alter the integrity of data or interfere with the availability of the computer or server.

A. Computers as targets B. Computers as storage devices

C. Computers as mediums D. Computers as communication tools

A. Computers as targets

Computer Science & Information Technology

You might also like to view...

In Word, to select an entire paragraph, you can double-click anywhere in the paragraph

Indicate whether the statement is true or false

Computer Science & Information Technology

Which Linux command will mount a virtual disk into the file system?

A. mkfs mydisk.img /mnt/vdisk B. mkfs /mnt/vdisk mydisk.img C. mount /mnt/vdisk mydisk.img D. mount mydisk.img /mnt/vdisk

Computer Science & Information Technology