________ involves using computers and computer networks in a subversive way to promote an agenda.

Fill in the blank(s) with the appropriate word(s).


Hacktivism

Computer Science & Information Technology

You might also like to view...

The ____ lets you apply filters individually, cumulatively, or apply individual filters more than once.

a. Filter Gallery b. Filter Basket c. Filter Manager d. Filter Brush

Computer Science & Information Technology

________ will expand across the width of the container and wrap down the container in the available space and a vertical scroll bar may also be added

A) Multiples B) Vertical multiples C) Horizontal multiples D) Bidirectional multiples

Computer Science & Information Technology

In UNIX, a ____ table is allocated to each active process that includes information such as the user and group identification numbers to determine file access privileges.

A. process B. subtext C. user D. database

Computer Science & Information Technology

A(n) ____ provides a pictorial representation of an algorithm using specifically defined shapes.

A. pseudocode B. formula C. opcode D. flowchart

Computer Science & Information Technology