________ is the destruction of hardware, software, or data.
A. Extortion
B. Hacking
C. Denial of Service
D. Sabotage
D. Sabotage
Computer Science & Information Technology
You might also like to view...
When a value is changed on a Detail sheet, the Summary sheet must be refreshed to update the Summary sheet formula.
a. true b. false
Computer Science & Information Technology
Which stats command function provides a count of how many unique values exist for a given field in the result set?
A. dc(field) B. count(field) C. count-by(field) D. distinct-count(field)
Computer Science & Information Technology