________ is the destruction of hardware, software, or data.

A. Extortion
B. Hacking
C. Denial of Service
D. Sabotage

D. Sabotage

Computer Science & Information Technology

You might also like to view...

When a value is changed on a Detail sheet, the Summary sheet must be refreshed to update the Summary sheet formula.

a. true b. false

Computer Science & Information Technology

Which stats command function provides a count of how many unique values exist for a given field in the result set?

A. dc(field) B. count(field) C. count-by(field) D. distinct-count(field)

Computer Science & Information Technology