The use of information technologies to corrupt or destroy an enemy's information and industrial infrastructure is called ________.
a. pod slurp
b. digital divide
c. electronic warfare
d. information warfare
Ans: d. information warfare
Computer Science & Information Technology
You might also like to view...
If you enter only one value for the border-radius property, that radius is applied to only one corner.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
In 2008, Amazon Kindle and Apple iPhone were released
Indicate whether the statement is true or false
Computer Science & Information Technology
The ________ is the periodic interest or a loan
Fill in the blank(s) with correct word
Computer Science & Information Technology
A(n) ________ provides a grid of columns and rows in which you can summarize data in an understandable way
Fill in the blank(s) with correct word
Computer Science & Information Technology