This term applies to an attack on computer files that encrypt the users files making them useless to the victims.

What will be an ideal response?

Ransomware

Computer Science & Information Technology

You might also like to view...

Which of the following BIOS/UEFI dialogs is most likely to display system temperature and fan speeds?

a. Boot sequence b. Hardware Monitor c. Integrated ports d. Security

Computer Science & Information Technology

A(n) __________ is a software package that usually consists of a text editor, a compiler or interpreter, and tools to test and debug programs.

a. compiler b. CPU c. storage device d. IDE

Computer Science & Information Technology