Match each of the following terms to its meaning:I.spear phishingII.rootkitIII.scarewareIV.zombieV.spywareA.program that allows hackers to gain access to your computer without your knowledgeB.malware on your computer used to convince you that your computer has a virusC.a computer controlled by a hackerD.sending e-mails to people known to be customers of a company to get individuals to reveal sensitive dataE.transmits information about you, such as your Internet-surfing habits
Fill in the blank(s) with the appropriate word(s).
D, A, B, C, E
You might also like to view...
Classes and interfaces for the JDBC API can be found in which package?
a. java.jdbc. b. javax.jdbc. c. java.sql. d. java.sql.jdbc.
The ____________________ is a specification for the database fields and their characteristics.
Fill in the blank(s) with the appropriate word(s).
Which of the following port is associated with NetBIOS?
a. 21 b. 80 c. 139 d. 443
Kamilla is creating a pet adoption website, and is currently learning about her options using theposition property. If Kamilla wants an element to remain in the same location in a browser window, even as the user scrolls through the Web page, she would use the ____ position property.
A. absolute B. fixed C. relative D. float