____ disguise themselves as useful programs or apps but do damage when you run them;
A. Trojan horses
B. Rootkits
C. All of the above
D. None of the above
Answer: C
You might also like to view...
When a subclass overloads a superclass method __________.
a. both methods may be called with a subclass object b. only the subclass method may be called with a subclass object c. only the superclass method may be called with a subclass object d. neither method may be called with a subclass object
Some people want to eliminate sexism in all forms of communication. You’ve been asked to create a program that can process a paragraph of text and replace gender-spe- cific words with gender-neutral ones. Assuming that you’ve been given a list of gender-specific words and their gender-neutral replacements (e.g., replace “wife” with “spouse,” “man” with “per- son,” “daughter” with “child” and so on), explain the procedure you’d use to read through a para- graph of text and manually perform these replacements. How might your procedure generate a strange term like “woperchild?” In Chapter 4, you’ll learn that a more formal term for “procedure” is “algorithm,” and that an algorithm specifies the steps to be performed and the order in which to perform them.
What will be an ideal response?
Parameters are used to share information between objects.
Answer the following statement true (T) or false (F)
________ databases are the most commonly used electronic databases.
A. Relational B. Flat-file C. Multidimensional D. Object-oriented