Which of the following is a small text file that web pages can place on your computer to keep track of your browsing activity?
a. Spyware
b. Cookies
c. Key loggers
d. Trojans
ANS: B
You might also like to view...
The discipline for a stack is:
a) data first inserted is the data first out. b) for a misbehaving stack, 30 lashes. c) data last inserted is the data first out. d) depends on the application of the stack.
The perimeter defense method divided computers into two camps: "Us" and "them".
Answer the following statement true (T) or false (F)
The ____ tag indicates the start and end of a table.
Fill in the blank(s) with the appropriate word(s).
It seems odd that cost and schedule estimates are developed during software project planning-before detailed software requirements analysis or design has been conducted. Why do you think this is done? Are there circumstances when it should not be done?
What will be an ideal response?