An intentional or unintentional act that can damage or otherwise compromiseĀ information and the systems that support it is known as a(n) __________.
A. threat
B. attackĀ
C. exploit
D. vulnerability
Answer: B
You might also like to view...
Why is it easy to export Access tables to Excel?
What will be an ideal response?
A(n) ____ contains your computer settings and is used if you experience a hard drive problem.
A. boot disk B. restore point C. differential backup D. incremental backup
You work in the registrar's office of a large university. You are responsible for creating a student database that contains students' ID numbers, names, addresses, phone numbers, and some medical information. Suppose the student database includes two tables, one containing information on courses and the other containing information on students. One student can take many courses and one course can be taken by many students. What would be the proper relationship between the tables?
What will be an ideal response?
Why would you use an external hard drive (hard disk or SSD) instead of a second internal hard drive (hard disk or SSD)?
What will be an ideal response?