Hackers often set up ________ in areas such as airports where users are expecting to find a free, wireless access point.
A. Trojan horses
B. nodes
C. botnets
D. rogue hotspots
Answer: D
You might also like to view...
Untying an input stream, inputStream, from an output stream, outputStream, is done with the function call:
a. inputStream.untie(). b. inputStream.untie(&outputStream). c. inputStream.tie(). d. inputStream.tie(0).
Which of the following statements is false?
a. You can determine the number of items in a set with the built-in len function. b. You can check whether a set contains a particular value using the in and not in operators. c. Sets are not iterable, so you cannot process each set element with a for loop. d. Sets are unordered, so there’s no significance to the iteration order.
JavaFX classes ________ and ________ (package javafx.stage) display dialogs that enable the user to select a file or directory, respectively.
a. Files, Directories b. FileChooser, DirectoryChooser c. FileSelector, DirectorySelector d. None of the above.
A peripheral device is linked to a computer through a(n) __________.
a. interface b. connection c. switch d. connector