A _____ is a security weakness or soft spot.
A. proxy
B. vulnerability
C. firewall
D. malware
Answer: B
Computer Science & Information Technology
You might also like to view...
The number of frames shown in each unit of video is expressed as ____.
A. MHz B. GHz C. fz D. fps
Computer Science & Information Technology
You can select up to ________ for row headings in a crosstab query
A) three fields B) eight fields C) five fields D) three records
Computer Science & Information Technology
PowerPoint's ________ feature enables you to type your initials and have them them replaced by your full name; for example, tn becomes Tom Norton
A) AutoCorrect B) AutoComplete C) AutoReplace D) AutoFill
Computer Science & Information Technology
The margin settings of a document are noted on the horizontal and vertical ____ by the blue-shaded measurements.
A. ribbons B. rulers C. tab indicators D. indent markers
Computer Science & Information Technology