1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
saveliy_v [14]
3 years ago
13

A deliberate, politically or religiously motivated attack against data compilations, computer programs, and/or information syste

ms which is intended to disrupt and/or deny service or acquire information which disrupts the social, physical, or political infrastructure of a target. This is known as:
a. cyberterrorism.
b. salami technique.
c. cyberstalking.
d. cyberbullying.
Computers and Technology
1 answer:
Sergio039 [100]3 years ago
5 0

Answer:

a. cyberterrorism.

Explanation:

Cyberterrorism can be defined as an illegal attack against the information stored in a data based done so as to intimidate a target. This is done to coerce a  target to action or to frustrate and destabilize a target.

In this act, the data compilations or information systems is deliberately attacked to disrupt the psychology of a target. It is one of the major tactics used in politics to frustrate the effort of a political system by an opposition.

You might be interested in
An employee’s total weekly pay equals the hourly wage multiplied by the total number of regular hours plus any overtime pay. Ove
Feliz [49]

Answer:

C++ programming language is used to implement this program using Dev C++. You can use any C++ compiler to run this program. The code and its explanation is given below in explanation section.

Explanation:

#include<iostream>

using namespace std;

int main()

{

int totalWeeklyPay;//total weekly pay  

int hourlyWage;// wages per hours

 

int totalRegularHour;// total regular hours worked

int totalOverTimeHour;// total over time hours worked

 

int weeklyTotalRegularPay;

int weeklyTotalOverTimePay;

 

cout<<"Enter Wage per hour: ";

 cin>>hourlyWage;

 if (hourlyWage<0)//if use enter negative value

  {

   cout<<"Please enter positive number number for wage per hour\n";

   cout<<"Enter Wage per hour: ";

     cin>>hourlyWage;

  }

cout<<"Enter total regular hour: ";

cin>>totalRegularHour;

if (totalRegularHour<0)//if user enter negative value

  {

   cout<<"Please enter positive total number of regular hour\n";

  cout<<"Enter total regular hour: ";

     cin>>totalRegularHour;

  }

cout<<"Enter total over time hour: ";

cin>>totalOverTimeHour;

 

 if(totalOverTimeHour<0)//if user enter negative value

   {

    cout<<"Please enter positive total number of over time hour\n";

  cout<<"Enter total over time hour: ";

  cin>>totalOverTimeHour;

     

     

 }

 

weeklyTotalRegularPay =hourlyWage*totalRegularHour;// total weekly regular hour pay

weeklyTotalOverTimePay=totalOverTimeHour*hourlyWage*1.5;// total weekly overtime pay

totalWeeklyPay=weeklyTotalRegularPay + weeklyTotalOverTimePay;//total weekly regular hour pay + // total weekly overtime pay

cout<<"Total Weekly Pay is: "<<totalWeeklyPay<<"$";//output

 

 

return 0;

 

}

3 0
3 years ago
Earning wise scope of web and mobile app development
lubasha [3.4K]

Answer:

Mobile are build in a specific platform such as Android, iOS ect and they use application such as apple store and have access to the system such as GPS and the camera. Mobile apps live and run on mobiles as on they are their own thing controlled by a developer on the other end

Explanation:

3 0
4 years ago
Amaya is curious how her computer actually boots up. Which of the
AleksAgata [21]
She should press OROM
6 0
3 years ago
Read 2 more answers
List two ways to exit the room properties dialog box, saving changes to the room
hammer [34]

Green check mark and X button (close window).

5 0
3 years ago
In order to make schemas that will appear in the Schema Library available in the XML Options dialog box, what file extension sho
Luba_88 [7]

Answer:

You can use your XML parser

Explanation:

hope this helps!

5 0
3 years ago
Other questions:
  • You have decided you want to remove a software application from your computer. what is the first place you should go to do so?
    15·1 answer
  • What components are in hard drives?
    12·1 answer
  • In some programming languages, such as C#, Visual Basic, and Java, every class you create is a child of one ultimate base class,
    8·1 answer
  • If you're looking to install Gigabit Ethernet, what cabling system would you use?
    9·1 answer
  • True/False/Unknown. For the interpretation of function calls, we assign the formal parametersto the valuations of the actual arg
    11·1 answer
  • What is the missing line of code?
    13·1 answer
  • I'm lonely every 14 and up come talk
    5·2 answers
  • In excel online what is it called when you join connecting cells together to span across more than one column and/or row?
    7·2 answers
  • Write a function assoc_list(l) that, given a list l, returns a list of tuples where the first integer represents the element of
    9·1 answer
  • You are given the following design parameters, fill in the table: All memory addresses are 32-bit long; A 64Kbyte (2^16 byte) ca
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!