A software program that allows access to a system without going through the normal logon procedures is called a
A. logic bomb
B. Trojan horse
C. worm
D. back door
Answer: D
You might also like to view...
If in evaluating A and B, A being false causes B not to be evaluated, is an example of ______ evaluation.
Fill in the blank(s) with the appropriate word(s).
Answer the following statements true (T) or false (F)
1. Class declarations specify a programmer-defined type/object. 2. Class members may include data (attributes) and methods (functions). 3. Class attributes define the operations that may be performed on class objects. 4. Constructors are special methods of a class that are executed when objects of the class type are created. 5. Constructors must have the same name as the class
A peer-to-peer (P2P) network is an example of ________ administration
A) corporate B) wide area C) central D) local
You do not have to worry about checking the spelling and grammar in your Word documents.
Answer the following statement true (T) or false (F)