________ are actions that can damage or misuse your computer and data when you are connected to a network.
A. Online security risks
B. Zombies
C. Crackers
D. Evil twins
Answer: A
You might also like to view...
When you use the form tool to create a form, Access analyzes relationships between tables, and automatically adds a(n) ________, which displays records with foreign key values that match the primary key value in the main form
Fill in the blank(s) with correct word
Match the following terms to their meanings:
I. Web site A. Creates a set of Web programming standards II. Web page B. Set of communication rules for computers III. W3C C. Collection of individual Web pages IV. XHTML D. Reformulation of HTML in XML V. Protocol E. Document on the World Wide Web
When the browser encounters a script element, the ________ processes each JavaScript statement and performs any actions associated with the statement
Fill in the blank(s) with correct word
A ________ provides multiple ports for connecting nodes.
A. hub B. repeater C. bridge D. gateway