The term ____________________ refers to the practice of driving around looking for and mapping insecure WLANs.

Fill in the blank(s) with the appropriate word(s).


wardriving

Computer Science & Information Technology

You might also like to view...

Which command below runs TestProgram, and passes in the values files.txt and 3?

a. java TestProgram files.txt 3. b. java TestProgram files.txt, 3. c. java TestProgram "files.txt", "3". d. None of the above.

Computer Science & Information Technology

Which of the following would be in a computer-specific criminal investigative toolkit?

a. forensic software b. labeling materials c. mobile carts d. photographic equipment

Computer Science & Information Technology

Use the _______ to view the document in a larger or smaller version than appears on the screen.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What type of collection is a queue?

A. linear B. parallel C. random D. geometric

Computer Science & Information Technology