A computer is the __________ of an attack when it is used to conduct an attack against another computer.

A. subject
B. object
C. target
D. facilitator


Answer: A

Computer Science & Information Technology

You might also like to view...

________ numbers are used in place of binary numbers because binary numbers are difficult to read

Fill in the blank(s) with correct word

Computer Science & Information Technology

The Banker’s Algorithm ________.

a) can provide better resource utilization than deadlock prevention b) incurs little overhead c) is appropriate for real-time systems d) facilitates applications programming

Computer Science & Information Technology

?_________ is a widely used proprietary format developed by Apple based on the Apple QuickTime movie format.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

?If a notebook contains sensitive material, you can __________. 

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology