A ________ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.
A. Trojan horse
B. web bug
C. denial-of-service
D. dictionary
Answer: D
You might also like to view...
Suppose you are on broadband connection with a speed of 6 Mbps. For a 5-second video file with a file size of 20 MB, its playback through pseudostreaming on the Web very likely will be _____.
A. smooth B. choppy
Add a picture ¯eld to the Student class and create constructors that take a Picture object as well. Also create accessors and modi¯er methods for the picture ¯eld. Add a show() method which will show the Picture object if it isn't null. See the Student class in bookClassesFinal for this.
What will be an ideal response?
Drilling down means to go down through the hierarchy of folders to find a specific file
Indicate whether the statement is true or false
With a selection structure, your program can choose between alternate courses of action.
Answer the following statement true (T) or false (F)