Which of the following is an attack designed to activate based on time?
A. Logic Bomb
B. Backdoor
C. Trojan
D. Rootkit
Answer: A. Logic Bomb
You might also like to view...
A(n) ____ diagram shows the transitions or changes that occur in a GUI (graphical user interface), in response to the user's actions.
A. class B. transition C. object D. component
How is a user granted permission to access a database?
What will be an ideal response?
Given the array: double invoices[100]; if the program assigns values for indexes greater than 100, what will the compiler display?
A. No error will display. B. Undeclared identifier. C. Cannot convert int to int[100]. D. Array out of bounds.
Case-Based Critical Thinking Questions Case 8-1 Ryan is creating a website for an automobile company. He wants to include media files on the web page and make the page appealing to the viewers. ?Ryan wants to embed the audio clip within the page, but he does not want the browser's native media player to show up. Which of the following HTML audio and video element attributes will help Ryan accomplish this?
A. ?autoplay B. ?loop C. ?controls D. ?preload