The act of exerting power over another by threatening to reveal damaging information about the aforementioned person is known as ___________.

A. tort
B. exposure
C. blackmail
D. distortion


Answer: D

Computer Science & Information Technology

You might also like to view...

Though an invitee can propose a new meeting time, only the ____ can change or delete the meeting.

A. originator B. attendee C. navigator D. scheduler

Computer Science & Information Technology

Which management frame type is sent by a station wanting to terminate the connection?

A. Deauthentication B. Disassociation C. Reassociation request D. Probe response

Computer Science & Information Technology

The ________ view in Access looks similar to an Excel spreadsheet

A) Report B) Form C) Datasheet D) Design

Computer Science & Information Technology

Which of the following is not an advantage of using the Expression Builder?

A) Its size
B) It will guarantee that you do not type field names incorrectly.
C) Placeholders
D) Easy access to various objects

Computer Science & Information Technology