App Logo

No.1 PSC Learning App

1M+ Downloads
Use of computer resources to intimidate or coerce others, is termed:

ACybernetics

BCyber terrorism

CWeb hosting

Dnone of these

Answer:

B. Cyber terrorism


Related Questions:

Any software that infects and damages a computer system without the owner's knowledge or permission is called?
തീവ്രവാദം , തട്ടിപ്പ് തുടങ്ങിയ സൈബർ ലോകത്തെ കുറ്റകൃത്യങ്ങൾ ചെയ്യുന്ന ഹാക്കർമാരാണ് ?
As per the IT (Amendment) Act 2008, Tampering with Computer Source Documents shall be punishable with imprisonment up to years, or with fine which may extend up to _____rupees, or with both.
A program that is loaded into a computer without the owner's knowledge and runs against his/her wishes is called?
2019 ൽ വാട്ട്സ് ആപ്പിനെ ബാധിച്ച സ്പൈവെയർ ഏതാണ് ?