Black hats and crackers are ____.

A. types of viruses
B. people who LANjack
C. virus protection software programs
D. names for people who create malware


Answer: D

Computer Science & Information Technology

You might also like to view...

To invoke the constructor of its superclass, a subclass can use the notation ____, and pass arguments to that constructor's parameters within the parentheses.

A. parent() B. base() C. child() D. super()

Computer Science & Information Technology

________ are used extensively in manufacturing environments

A) Speech synthesizers B) Robots C) Remote controls D) RFIDs

Computer Science & Information Technology

To align a single object on the slide, verify that Align to Selected Text has a check mark.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

?One type of validity check, called _____, is a set of rules that avoids data inconsistency and quality problems.

A. ?candidate integrity B. ?foreign integrity C. ?referential integrity D. ?combinatorial integrity

Computer Science & Information Technology