________ are actions that can damage or misuse your computer and data when you are connected to a network.

A. Online security risks
B. Zombies
C. Crackers
D. Evil twins


Answer: A

Computer Science & Information Technology

You might also like to view...

When you use the form tool to create a form, Access analyzes relationships between tables, and automatically adds a(n) ________, which displays records with foreign key values that match the primary key value in the main form

Fill in the blank(s) with correct word

Computer Science & Information Technology

Match the following terms to their meanings:

I. Web site A. Creates a set of Web programming standards II. Web page B. Set of communication rules for computers III. W3C C. Collection of individual Web pages IV. XHTML D. Reformulation of HTML in XML V. Protocol E. Document on the World Wide Web

Computer Science & Information Technology

When the browser encounters a script element, the ________ processes each JavaScript statement and performs any actions associated with the statement

Fill in the blank(s) with correct word

Computer Science & Information Technology

A ________ provides multiple ports for connecting nodes.

A. hub B. repeater C. bridge D. gateway

Computer Science & Information Technology