The Computer Fraud and Abuse Act of 1986:

a. Generally makes it a misdemeanor to access a computer without proper permission.
b. Is only used when harm results as a result of the access.
c. Includes passive receipt of electronic information.
d. Makes it a felony to knowingly access a computer without authorization with intent or reason to believe that the information would be used to injure the United States of to benefit a foreign country.


d. Makes it a felony to knowingly access a computer without authorization with intent or reason to believe that the information would be used to injure the United States of to benefit a foreign country.

Computer Science & Information Technology

You might also like to view...

Which of the following are common orientations for smart phones and tablets?

A) portrait B) landscape C) diagonal D) Both A and B. E) A, B and C. F) None of the above.

Computer Science & Information Technology

Running fewer applications at once is a way to resolve which type of bottleneck?

A. disk B. network C. memory D. processor

Computer Science & Information Technology

In the variable initialization: char course[20] = “Intro to C++”; the character at course[6] will be:

A. \0 B. the letter o C. the letter t D. a space.

Computer Science & Information Technology

Which of the following are logical divisions of a Storage Area Network (SAN)?

A. LUNS B. vSANs C. VLANs D. VLSM

Computer Science & Information Technology