__________ is the process of modifying an executable file or data stream by adding additional commands.

A. Keylogging
B. Pharming
C. Brute force attack
D. Code injection


Answer: D

Computer Science & Information Technology

You might also like to view...

Most database tables have a(n) ____________, which is a column that can be used to identify a specific row.

a. identifier b. primary key c. key word d. column name

Computer Science & Information Technology

Suppose that alpha and beta are int variables. The statement alpha = beta--; is equivalent to the statement(s) ____.

A. alpha = 1 - beta; B. alpha = beta - 1; C. beta = beta - 1; alpha = beta; D. alpha = beta; beta = beta - 1;

Computer Science & Information Technology

A byte provides enough different combinations of 0s and 1s to represent 256 different characters.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

You should buy a patch panel that matches the ____________________ rating of the UTP cabling you are using.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology