You should beware of a person attempting to use your computer after you step away from it, a term referred to as which of the following?

shoulder surfing

tailgating

social engineering

session hijacking


tailgating

Computer Science & Information Technology

You might also like to view...

In the private section of HashTable, we had a pointer to a function; yet, we did not need to write a destructor for HashTable because:

A. the Array data member takes care of freeing the memory used by the pointer to the function B. pointers to functions free the dynamic memory that they point to automatically upon destruction of the object that contains them C. the function in dynamic memory can still be called after the HashTable object is destroyed, so there is no memory leak D. the pointer to a function does not point to dynamic memory

Computer Science & Information Technology

?The ____________________, also known as Rijndael, is a block cipher adopted as an encryption standard by the U.S. government.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What is wrong in the following code?

``` vector v; v[0] = 2.5; ``` a. The program has a compile error because there are no elements in the vector. b. The program has a runtime error because there are no elements in the vector. c. The program has a runtime error because you cannot assign a double value to v[0]. d. The program has a compile error because you cannot assign a double value to v[0].

Computer Science & Information Technology

A graphics tablet is also known as a(n) ________

A) OCR reader B) digitizing tablet C) infrared light reader D) RFID

Computer Science & Information Technology