Hackers often set up ________ in areas such as airports where users are expecting to find a free, wireless access point.

A. Trojan horses
B. nodes
C. botnets
D. rogue hotspots


Answer: D

Computer Science & Information Technology

You might also like to view...

Untying an input stream, inputStream, from an output stream, outputStream, is done with the function call:

a. inputStream.untie(). b. inputStream.untie(&outputStream). c. inputStream.tie(). d. inputStream.tie(0).

Computer Science & Information Technology

Which of the following statements is false?

a. You can determine the number of items in a set with the built-in len function. b. You can check whether a set contains a particular value using the in and not in operators. c. Sets are not iterable, so you cannot process each set element with a for loop. d. Sets are unordered, so there’s no significance to the iteration order.

Computer Science & Information Technology

JavaFX classes ________ and ________ (package javafx.stage) display dialogs that enable the user to select a file or directory, respectively.

a. Files, Directories b. FileChooser, DirectoryChooser c. FileSelector, DirectorySelector d. None of the above.

Computer Science & Information Technology

A peripheral device is linked to a computer through a(n) __________.

a. interface b. connection c. switch d. connector

Computer Science & Information Technology