__________________ are spread by several methods, including running executable code, sharing disks or memory sticks, opening e-mail attachments, and viewing infected or malicious Web pages.
Fill in the blank(s) with the appropriate word(s).
Viruses
Computer Science & Information Technology
You might also like to view...
Let x be an unsigned int on a machine with 4-byte unsigned ints. What effect does
x>>=1; x<<=1; have? a. There is no effect. b. The leftmost bit of x is set to 0. c. The rightmost bit of x is set to 0. d. Both (b) and (c).
Computer Science & Information Technology
For the 24-bit color depth, what are the RGB values for
(i) white (ii) black (iii) red (iv) green (v) blue (vi) cyan (vii) magenta (viii) yellow
Computer Science & Information Technology
Which of the following sets the window width to 100 pixels and the height to 200 pixels?
A. setSize(100, 200); B. setSize(200, 100); C. setDims(100, 200); D. set(200, 100);
Computer Science & Information Technology
Which of the following tools can be used for banner grabbing?
a. Nslookup b. Nmap c. Netcat d. Nessus
Computer Science & Information Technology