What are computer programs that perform destructive acts based upon a trigger event called?
a. viruses
b. Trojan horses
c. worms
d. logic bombs
d
You might also like to view...
The ________ folder is used by Internet sites to store information about the user
Fill in the blank(s) with correct word
The Adoption and Safe Families Act of 1997:
a. Ensures that an inmate mother can get her children back upon release. b. Mandates the termination of parental rights once a child has been in foster care for 15 months. c. Mandates the termination of inmate father's rights but not inmate mother's rights. d. Makes adoption of "prison orphans" more difficult.
Which of the following groups is arrested most often?
A. Gigolos B. Customers of prostitutes C. Pimps D. Prostitutes
Facilities shall have a procedure for face to face observation of all inmates by corrections officers at least once every
a. 15 minutes b. 30 minutes c. 45 minutes d. hour