A(n) _____ worm makes use of information on an infected computer to mail itself to everyone listed in your e-mail address book.

A. post office
B. address book
C. e-mail
D. mass-mailing


Answer: D

Computer Science & Information Technology

You might also like to view...

Suppose the file is ordered by the non-key field DEPARTMENTCODE and we want to construct a clustering index on DEPARTMENTCODE that uses block anchors (every new value of DEPARTMENTCODE starts at the beginning of a new block). Assume there are 1000 distinct values of DEPARTMENTCODE, and that the EMPLOYEE records are evenly distributed among these values. Calculate (i) the index blocking factor bfr i (which is also the index fan-out fo); (ii) the number of first-level index entries and the number of first-level index blocks; (iii) the number of levels needed if we make it a multi-level index; (iv) the total number of blocks required by the multi-level index; and (v) the number of block accesses needed to search for and retrieve all records in the file having a specific DEPARTMENTCODE value u

Consider a disk with block size B=512 bytes. A block pointer is P=6 bytes long, and a record pointer is P R =7 bytes long. A file has r=30,000 EMPLOYEE records of fixed-length. Each record has the following fields: NAME (30 bytes), SSN (9 bytes), DEPARTMENTCODE (9 bytes), ADDRESS (40 bytes), PHONE (9 bytes), BIRTHDATE (8 bytes), SEX (1 byte), JOBCODE (4 bytes), SALARY (4 bytes, real number). An additional byte is used as a deletion marker.

Computer Science & Information Technology

The term raw binary data refers to letters, punctuation marks, and digits that can be displayed or printed.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Before making a website publicly available, it's important to test it on as many devices that your audience may be using as possible. 

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Effective communication skills are more important in telephone conversations than in face-to-face, email, or other forms of communications with users.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology