__________________ are spread by several methods, including running executable code, sharing disks or memory sticks, opening e-mail attachments, and viewing infected or malicious Web pages.

Fill in the blank(s) with the appropriate word(s).


Viruses

Computer Science & Information Technology

You might also like to view...

Let x be an unsigned int on a machine with 4-byte unsigned ints. What effect does

x>>=1; x<<=1; have? a. There is no effect. b. The leftmost bit of x is set to 0. c. The rightmost bit of x is set to 0. d. Both (b) and (c).

Computer Science & Information Technology

For the 24-bit color depth, what are the RGB values for

(i) white (ii) black (iii) red (iv) green (v) blue (vi) cyan (vii) magenta (viii) yellow

Computer Science & Information Technology

Which of the following sets the window width to 100 pixels and the height to 200 pixels?

A. setSize(100, 200); B. setSize(200, 100); C. setDims(100, 200); D. set(200, 100);

Computer Science & Information Technology

Which of the following tools can be used for banner grabbing?

a. Nslookup b. Nmap c. Netcat d. Nessus

Computer Science & Information Technology