A deliberate, politically or religiously motivated attack against data compilations, computer programs, and/or information systems that is intended to disrupt and/or deny service or acquire information that disrupts the social, physical, or political infrastructure of a target, is known as ________

a. cyberterrorism
b. salami technique
c. cyberstalking
d. cyberbullying

Answer: a

Computer Science & Information Technology

You might also like to view...

The button for printing a document is found on the Standard bar

Indicate whether the statement is true or false

Computer Science & Information Technology

You would use the ________ command found on the Menu bar to place hyperlinks, headers and tables, pictures and tables into your document

Fill in the blank(s) with correct word

Computer Science & Information Technology