Which of the following reveals a system vulnerability and is often documented, either by the manufacturer or by an attacker?
A. hole
B. exploit
C. break-in
D. attack
Answer: B
You might also like to view...
Each fact in a Prolog program is similar to a record in a database, but you can query a Prolog program's database by asking a question, called a(n) _______ in Prolog jargon.?
Fill in the blank(s) with the appropriate word(s).
EX Case 5-1Maria's grandfather has agreed to help her invest her $2,000 savings account in the stock market. He asked that she create an Excel worksheet to track how her stocks are doing. Because he is coming over in a few days, she wants to update the worksheet. When beginning to create a formula that multiplies the current price of the stock by the number of shares, Maria would click the formula bar, then type a(n) ____.
A. = (equal sign) B. + (plus sign) C. & (ampersand) D. ! (exclamation point)
?Which of the following is NOT considered business intelligence practice??
A. ?Data extraction B. Visualization C. ?Analysis D. Transaction processing
Identify the letter of the choice that best matches the phrase or definition.
A. An exact duplication of the hard drive B. Copies files that have changed since the last complete backup C. Backs up folders and files that are selected by hand D. Creates and stores a backup on an in-house network folder E. Backs up files on a secure server