____ statements can be used iteratively to expand the intruder's view of the database and allow further collection of information.

A. Iterative
B. Conditional
C. Secondary
D. Primary


Answer: B

Computer Science & Information Technology

You might also like to view...

The reason we don’t consider nodes that have equal values in a binary search tree is because:

A. the nodes often contain struct objects of information B. it would be impossible to search for two or more values that are the same C. we need to be able to search for a node, so it makes sense to use keys D. it would be impossible to provide the elements of the nodes in order

Computer Science & Information Technology

TCP works with ____ to manage data packets on the network.?

A. ?IP B. ?FIN C. ?ARP D. ?SSH

Computer Science & Information Technology

The OS/JCL DD statement __________ parameter specifies the physical input or output device.

a. UNIT b. SPACE c. SYSIN or SYSOUT d. DEVICE

Computer Science & Information Technology

If you have trouble opening a Microsoft Office Word file when using the Microsoft Word application, it could be due to all of the following EXCEPT ________

A) the file was created by a newer version of the application B) the file is corrupt C) the file was saved using an extension not recognized by the application D) the file is too large to be handled by the application

Computer Science & Information Technology