The use of information technologies to corrupt or destroy an enemy's information and industrial infrastructure is called ________.

a. pod slurp
b. digital divide
c. electronic warfare
d. information warfare


Ans: d. information warfare

Computer Science & Information Technology

You might also like to view...

If you enter only one value for the border-radius property, that radius is applied to only one corner.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

In 2008, Amazon Kindle and Apple iPhone were released

Indicate whether the statement is true or false

Computer Science & Information Technology

The ________ is the periodic interest or a loan

Fill in the blank(s) with correct word

Computer Science & Information Technology

A(n) ________ provides a grid of columns and rows in which you can summarize data in an understandable way

Fill in the blank(s) with correct word

Computer Science & Information Technology