A computer is the __________ of an attack when it is used to conduct an attack against another computer.
A. subject
B. object
C. target
D. facilitator
Answer: A
Computer Science & Information Technology
You might also like to view...
________ numbers are used in place of binary numbers because binary numbers are difficult to read
Fill in the blank(s) with correct word
Computer Science & Information Technology
The Banker’s Algorithm ________.
a) can provide better resource utilization than deadlock prevention b) incurs little overhead c) is appropriate for real-time systems d) facilitates applications programming
Computer Science & Information Technology
?_________ is a widely used proprietary format developed by Apple based on the Apple QuickTime movie format.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
?If a notebook contains sensitive material, you can __________.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology