Answer the following statements true (T) or false (F)
1. The legal and ethical aspects of computer security encompass a broad range of topics.
2. Computer attacks are considered crimes but do not carry criminal sanctions.
3. “Computers as targets” is a form of crime that involves an attack on data integrity, system integrity, data confidentiality, privacy, or availability.
4. The relative lack of success in bringing cybercriminals to justice has led to an increase in their numbers, boldness, and the global scale of their operations.
5. No cybercriminal databases exist that can point investigators to likely suspects.
1. TRUE
2. FALSE
3. TRUE
4. TRUE
5. TRUE
You might also like to view...
Which of the following is not one the rules for forming structured programs?
a. Begin with the “simplest activity diagram.” b. Any transition arrow can be reversed. c. Any action state can be replaced by two action states in sequence. d. Any action state can be replaced by any control statement.
Mary is writing a program that repeatedly prompts the user for an inventory number and displays a message stating whether on not the object is in stock. What sort of control structure(s) will she need to include in her program?
a. repetition and selection b. selection and sequential c. repetition and sequential d. repetition, selection, and sequential