________ is the destruction of hardware, software, or data.

A. Extortion
B. Hacking
C. Denial of Service
D. Sabotage


D. Sabotage

Computer Science & Information Technology

You might also like to view...

Using e-mail lists to send out advertising circulars, catalogs, or credit card applications is known as ________ advertising

A) direct mail B) direct marketing C) contact list D) synchronized

Computer Science & Information Technology

In the Columns dialog box, Spacing refers to the ________

A) space between the lines in a column B) space below each column C) space above each column D) space between each column

Computer Science & Information Technology

How do interactive, Web, and multimedia differ from each other? What do they have in common?

What will be an ideal response?

Computer Science & Information Technology

________ provide additional information and request user input.

A. Ribbons B. Windows C. Toolbars D. Dialog boxes

Computer Science & Information Technology