In the context of computer crimes, those who attempt to destroy the infrastructure components of governments and financial institutions are known as _____.

a. hacktivists
b. white hat hackers
c. black hat hackers
d. cyberterrorists


d. cyberterrorists
A cyberterrorist is someone who attempts to destroy the infrastructure components of governments, financial institutions, utilities, and emergency response units. Cyberterrorism uses the Internet to spread terrorist activities, which generally revolve around political, social or religious agendas.

Computer Science & Information Technology

You might also like to view...

A data flow that contains data that are used between processes is called:

A) internal. B) derived. C) base. D) iterative.

Computer Science & Information Technology

List the situations that warrant use of J A D in place of personal organizational interviews.

What will be an ideal response?

Computer Science & Information Technology

On the Home tab, the Line Spacing button is located in the ________ group

A) Styles B) Paragraph C) Editing D) Formatting

Computer Science & Information Technology

The Group, Sort, and Total pane is used to select sort fields and grouping fields for a report. ____________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology