What can be installed without your knowledge?
What will be an ideal response?
spyware, viruses
You might also like to view...
One of the most commonly used_______-encryption algorithms is the Data Encryption Standard (DES).
a) symmetric. b) asymmetric. c) block. d) None of the above.
Productivity software suites typically include all of the following applications EXCEPT ________
A) spreadsheet B) presentation C) word processing D) video editing
A(n) ____________________ consists of a fixed number of columns within which the characters of a data value can be placed.
Fill in the blank(s) with the appropriate word(s).
Match each of the following concepts to its best description:I.COVARIANCE.PII.COVARIANCE.SIII.HistogramIV.Critical value of FV.Random variationA.Normal unpredictable changes within a population datasetB.Measures how 2 sets of sample data vary simultaneouslyC.Determines the significance of the F_TestD.Measures how 2 sets of an entire population data vary simultaneouslyE.A charting option available in the Analysis Toolpak
Fill in the blank(s) with the appropriate word(s).