This is the use of computer resources to intimidate or coerce others:
a. Logic bomb
b. Trojan horse
c. Cyber terrorism
d. Web jacking
c
You might also like to view...
________ involves information risk assessment and intelligence activities in a process whereby operations are analyzed to identify vulnerabilities
a. OPSEC b. COMPSEC c. INFOTEL d. INTELSEC e. OPSEEK
Direct injustice results:
a. From physical injury to the victim. b. From overreaction by the criminal justice system, such as excessive force used by police. c. When a criminal defendant goes directly to prison. d. When a defendant in a criminal case is released on a technicality, only to commit other crimes.
Managers can reduce employee stress by
a. lightening up b. enhanced policy c. acting as a safety valve d. a and c e. none of the above
The U.S. Supreme Court is considered as a court of ____ jurisdiction
Fill in the blank(s) with correct word