Collectively, all malicious programs are referred to as:
A. vectors
B. bugs
C. malware
D. suites
Answer: C
Computer Science & Information Technology
You might also like to view...
A gradient smoothness setting of ____ indicates an equally weighted transition in color pixels.
a. 0% b. 25% c. 50% d. 100%
Computer Science & Information Technology
In a function call, the items enclosed in parentheses are known as ____________________.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Reusable pieces of formatted content or document parts, such as custom headers, are called what?
A. Building blocks B. Fields C. Content controls D. Custom parts
Computer Science & Information Technology
The process of applying a salt and cryptographic hash to a password then repeating the process many times is known as which of the following?
A. Collision resistance B. Rainbow table C. Key stretching D. Brute force attack
Computer Science & Information Technology