____ typically creates larger file sizes than GIF, but the quality of the transparency is much higher.
a. TIFF
b. PNG
c. JPG
d. BMP
b. PNG
You might also like to view...
MC The code in a finally suite executes if an exception__________ .
a) occurs in the try suite. b) does not occur in the try suite. c) Both a and b. d) None of the above.
Which of the following is NOT a criteria typically used by stateless packet filters to determine whether or not to block packets.
A. IP address B. ports C. data patterns D. TCP flags
Write statements that assign random integers to the variable n in the following ranges:
a) 1 £ n £ 2 b) 1 £ n £ 100 c) 0 £ n £ 9 d) 1000 £ n £ 1112 e) –1 £ n £ 1 f) –3 £ n £ 11
Answer the following statements true (T) or false (F)
1. A denial-of-service attack is an attempt to compromise availability by hindering or blocking completely the provision of some service. 2. DoS attacks cause damage or destruction of IT infrastructures. 3. A DoS attack targeting application resources typically aims to overload or crash its network handling software. 4. The SYN spoofing attack targets the table of TCP connections on the server. 5. A cyberslam is an application attack that consumes significant resources, limiting the server’s ability to respond to valid requests from other users.