In what year was the Computer Fraud and Abuse Act passed??

A. ?1976
B. ?1980
C. ?1986
D. ?1996


Answer: C

Computer Science & Information Technology

You might also like to view...

Draw a diagram that compares the flow of app development through the 16 steps with the seven phases of the S D L C.

A suggested diagram follows. This will vary depending on how the student creates the actual diagram and divides up the phases.

Computer Science & Information Technology

A wired network has a Gigabit Ethernet switch, Gigabit Ethernet adapters, and CAT5 wiring. What is the maximum speed this network supports?

a. 1000Mbps Ethernet b. 10Mbps Ethernet c. 100Mbps Ethernet d. Half-duplex

Computer Science & Information Technology

You notice that your computer is running slow and decide to reboot the computer to see if that will fix the problem. During the reboot, you notice that the amount of RAM shown during the RAM count is not the same as it was the day before. ? What might cause this problem?

A. CMOS battery is failing. B. RAM module has become unseated. C. CMOS RAM has become corrupt. D. System is overheating.

Computer Science & Information Technology

A(n) ____________________ VPN connection enables two LANs to function as a single network, sharing files and services as if they were in the same building.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology