All of the following are unwanted software a hacker could install on your computer, EXCEPT ________
A) keystroke loggers
B) ghosts
C) Trojan horses
D) rootkits
B
Computer Science & Information Technology
You might also like to view...
Outside of a C++ program, a file is identified by its ________. Inside a C++ program, a file is accessed through a ________.
A) file number, file name B) file name, file number C) name, address D) name, file stream object E) None of the above
Computer Science & Information Technology
For many organizations, proxy servers have been superseded by a newer technology known as which of the following?
A) TCP B) NAT C) FTP D) DMZ
Computer Science & Information Technology
All of the following could produce a #NAME? error with the exception of which one?
A) Misspelled word B) Invalid function name C) Invalid arguments in a function D) Invalid range name
Computer Science & Information Technology
READ is the __________ implementation of "input."
A. Fortran B. Cobol C. C++ D. C#
Computer Science & Information Technology