Which of the following is a virus hoax?
a. Zafi.d
b. Bropia
c. Jdbgmgr
d. Santy
ANS: C
Computer Science & Information Technology
You might also like to view...
A _________ attack exploits the fact that an encryption or decryption algorithm often takes slightly different amounts of time on different inputs. ?
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Which of the following is an example of an instant messaging service?
A) Monster B) Yahoo Messenger C) Flickr D) LinkedIn
Computer Science & Information Technology
What command can be used to flush the local DNS cache on a Windows computer?
A. nslookup -f B. ipconfig /flushdns C. dns dump D. service dnscache restart
Computer Science & Information Technology
_____, another type of pseudo selector, is an object that exists only in the rendered page.?
A. ?Pseudo-class B. ?Pseudo-element C. ?Pseudo-object D. ?Pseudo-type
Computer Science & Information Technology