A(n) ________ is a series of actions that can be programmed to automate tasks.
Fill in the blank(s) with the appropriate word(s).
macro
You might also like to view...
A __________ is a dedicated computer that interfaces with computers outside a network and has special security precautions built into it in order to protect sensitive files on computers within the network.
A) firewall B) ACL C) matrix D) guard
In the early days of computing, a ________ was an individual that possessed advanced skills, often making a computer do something that it wasn't originally intended to do.
A. hacktivist B. rogue C. hacker D. cyberterrorist
Write an algebraic expression for the statement given below. Let represent the unknown quantity. 3 less than six times a number.
What will be an ideal response?
Security implementation involves four complementary courses of action: prevention, detection, response, and _________.
Fill in the blank(s) with the appropriate word(s).