A deliberate, politically or religiously motivated attack against data compilations, computer programs, and/or information systems that is intended to disrupt and/or deny service or acquire information that disrupts the social, physical, or political infrastructure of a target, is known as ________
a. cyberterrorism
b. salami technique
c. cyberstalking
d. cyberbullying
Answer: a
Computer Science & Information Technology
You might also like to view...
The button for printing a document is found on the Standard bar
Indicate whether the statement is true or false
Computer Science & Information Technology
You would use the ________ command found on the Menu bar to place hyperlinks, headers and tables, pictures and tables into your document
Fill in the blank(s) with correct word
Computer Science & Information Technology