________ involves using computers and computer networks in a subversive way to promote an agenda.
Fill in the blank(s) with the appropriate word(s).
Hacktivism
You might also like to view...
The ____ lets you apply filters individually, cumulatively, or apply individual filters more than once.
a. Filter Gallery b. Filter Basket c. Filter Manager d. Filter Brush
________ will expand across the width of the container and wrap down the container in the available space and a vertical scroll bar may also be added
A) Multiples B) Vertical multiples C) Horizontal multiples D) Bidirectional multiples
In UNIX, a ____ table is allocated to each active process that includes information such as the user and group identification numbers to determine file access privileges.
A. process B. subtext C. user D. database
A(n) ____ provides a pictorial representation of an algorithm using specifically defined shapes.
A. pseudocode B. formula C. opcode D. flowchart