The term ____________________ refers to the practice of driving around looking for and mapping insecure WLANs.
Fill in the blank(s) with the appropriate word(s).
wardriving
Computer Science & Information Technology
You might also like to view...
Which command below runs TestProgram, and passes in the values files.txt and 3?
a. java TestProgram files.txt 3. b. java TestProgram files.txt, 3. c. java TestProgram "files.txt", "3". d. None of the above.
Computer Science & Information Technology
Which of the following would be in a computer-specific criminal investigative toolkit?
a. forensic software b. labeling materials c. mobile carts d. photographic equipment
Computer Science & Information Technology
Use the _______ to view the document in a larger or smaller version than appears on the screen.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
What type of collection is a queue?
A. linear B. parallel C. random D. geometric
Computer Science & Information Technology