1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
grandymaker [24]
3 years ago
13

__________is threatening to steal or actually stealing information from a company and then demanding payment to not use or relea

se that information. 1) Competitive intelligence 2) Espionage 3) Information extortion 4) Intellectual property
Computers and Technology
1 answer:
Ludmilka [50]3 years ago
5 0

Answer: 3) Information extortion

Explanation:

Information extortion is defined as the technique through which a person tends to steal and hold the confidential and important information with theirself and then demand ransom for returning it.

  • Releasing information to corrupt and attacking sources can be a consequence if the demand or condition is not fulfilled by the authorized party or person.
  • Other options are incorrect because espionage is spying military information.Competitive intelligence is used for managing strategic plans.Intellectual property is created through mind power.
  • Thus, the correct option is option(3).
You might be interested in
You are connected to a server on the Internet and you click a link on the server and receive a time-out message. What layer coul
Grace [21]

Answer: Application layer

Explanation: Application layer is the level in the OSI model which carries out the function of the abstraction in the network.The abstraction works by maintaining the interface between application and network.

It helps in the transferring of the information and data as well using the protocols. So,if any time out message alert is received  by clicking on the link then the server condition is usually busy and thus cannot respond. In this case application layer is responsible for the problem.

7 0
3 years ago
What is troubleshooting?
Arisa [49]
Finding and fixing a problem
6 0
3 years ago
Read 2 more answers
Lonnie has several workbooks that contain financial and sales data. He needs to ensure that if the data in a single cell in one
Rzqust [24]

Answer: Linked cell

Explanation: I just did a test

7 0
4 years ago
These are questions from my Computer/Customer Support Class
vladimir2022 [97]
Hey

1. Workers 

2. im not sure about this on

3. The

Hoped I Helped
5 0
3 years ago
<br> Help me please I need the correct answe
brilliants [131]

Pretty much, yeah.

if it's wrong just pick false.

3 0
4 years ago
Other questions:
  • Only the _________ can add users with passwords and limit user access to selected areas.
    5·1 answer
  • What two features distinguished Windows 2.0 from Windows 1.0?
    5·1 answer
  • Software used the control a computer's hardware
    14·1 answer
  • PLEASE HELP
    12·2 answers
  • Which statement about trees is false?
    12·1 answer
  • Write a java method called vowelCount that accepts a String as a parameter and produces/returns an array of integers representin
    7·1 answer
  • You have just built a new system from scratch. you turn the computer on but the system boot fails and sounds a beep code. what m
    15·1 answer
  • What is coupling in computer science <br><br>​
    13·2 answers
  • What is a security strategy comprised of products and services that offer remote support for mobile devices, such as smart phone
    7·1 answer
  • The _____ describes how data actually moves from an application on one computer to an application on another networked computer.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!