________ is the destruction of hardware, software, or data.
A. Extortion
B. Hacking
C. Denial of Service
D. Sabotage
D. Sabotage
You might also like to view...
Which of the following refers to providing an assured level of throughput and resources?
A. PRI B. TDM C. QoS D. MPLS
Each employee can only be in the employees table exactly one time. However, an employee can be in the orders table many times, once for each sale. This is an example of a(n) ________ relationship
Fill in the blank(s) with correct word
The Report Wizard:
A) does not allow the use of fields from more than one table. B) is less user friendly than the Report Design tool. C) enables you to specify how the report data is grouped and sorted. D) asks questions, then suggests ways to design the report manually.
You should defragment and optimize your disk with a utility before recording and playing back your movie files because:
a. digital video is notorious for corrupting hard drives. b. digital video recording is susceptible to residual magnetism from previous files. c. digital video is stored in a low-level file format, and thus non-contiguous sectors can be “lost” if the file database is not accurate. d. fragmented files often lose audio/video synchronization due to markers and cues being lost. e. digital movie data must stream rapidly and without interruption from your disk drive.