Which of the following is used to describe hacking activities that the hacker believes the activities are ethically valid?

a. Computer-based espionage
b. Information warfare
c. Cyber terrorism
d. Hacktivism


ANS: D

Computer Science & Information Technology

You might also like to view...

IntStream method ________ performs the count, min, max, sum and average operations in one pass of an IntStream’s elements and returns the results as an IntSummaryStatistics object (package java.util).

a. allStatistics. b. completeStatistics. c. entireStatistics. d. summaryStatistics

Computer Science & Information Technology

A(n) ____ file plays in an HTML file in a Web browser using the Flash Player plug-in.

A. SWA B. FLA C. SWF D. FLS

Computer Science & Information Technology

During a particularly extensive review of the email archives for a large organization you perform several complex searches. You want to get a good idea of how efficient your searches are. What are two variables that can be used to calculate a percentage of accuracy?

a. Accuity b. Precision c. Recall d. Granularity

Computer Science & Information Technology

With respect to converting digital data into analog signals, AM stands for:

a. Asynchronous Manchester b. Analog Multimode c. Amplitude Modulation d. Anomaly Multiplexing e. Analytical Mosaic

Computer Science & Information Technology