You should beware of a person attempting to use your computer after you step away from it, a term referred to as which of the following?
shoulder surfing
tailgating
social engineering
session hijacking
tailgating
You might also like to view...
In the private section of HashTable, we had a pointer to a function; yet, we did not need to write a destructor for HashTable because:
A. the Array data member takes care of freeing the memory used by the pointer to the function B. pointers to functions free the dynamic memory that they point to automatically upon destruction of the object that contains them C. the function in dynamic memory can still be called after the HashTable object is destroyed, so there is no memory leak D. the pointer to a function does not point to dynamic memory
?The ____________________, also known as Rijndael, is a block cipher adopted as an encryption standard by the U.S. government.
Fill in the blank(s) with the appropriate word(s).
What is wrong in the following code?
```
vector
A graphics tablet is also known as a(n) ________
A) OCR reader B) digitizing tablet C) infrared light reader D) RFID