GLOSSARY

Feb 01, 2011 · 4) Computer information attacks by terrorists using computer technology and the Internet is called _____ PROCEDURE: Write the AIM and DO NOW. Get students working! Take attendance. Go Over HW. Collect HW. Go over the Do Now. Sample Test Question: 1) Each of the following is intended to protect information, except ................
................