A malware program that encrypts or otherwise renders computer or digital resources inoperable or inaccessible in furtherance of the illegal compulsion of an action or exchange is termed as ________.
Fill in the blank(s) with correct word
Question 2
Which of the following is NOT one of the ways a person can be cyber stalked?
a. E-mail harassment
b. Chat room threats
c. Virus attacks
d. Hacking into a computer for personal information