The acquisition of a domain by someone other than the holder of the trademark for the purpose of harming the trademark holder or selling the domain name at an inflated price is an act referred to as ____.
A. cyberinvasion
B. cyberintrusion
C. digital invasion
D. cybersquatting
Answer: D
You might also like to view...
A __________ interface allows the user to interact with the operating system and other programs by using graphical elements.
a. graphical menu b. graphical user c. command line d. command prompt
The _________ layer deals with the logical structure of files and with the operations that can be specified by users, such as open, close, read, and write.
Fill in the blank(s) with the appropriate word(s).
Refresh/Restore is a Windows installation method that _______________.
A. reinstalls an OS B. attempts to fix errors in an OS C. refreshes the screen during installation D. restores an OS to original factory status
Which of the following are the reserved words?
a. public b. static c. void d. class