A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.
A. denial of service (DoS)
B. zombie
C. logic bomb
D. rootkit
Answer: D
Computer Science & Information Technology
You might also like to view...
open is a __________ function of the ofstream and ifstream class.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Privacy is broken down into four major areas: anonymity, unlinkability, unobservability, and _________.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
If the outline level is accidentally deleted, you should use the:
A) Backspace key and then the Enter key. B) Delete key and then the Tab key. C) Delete key and then the Enter key. D) Backspace key and then the Tab key.
Computer Science & Information Technology
With the Symbol Shifter tool, a smaller brush will affect the stacking order of surrounding instances.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology