________ viruses are often transmitted by a flash drive left in a USB port

A) Logic bomb B) Macro C) Boot-sector D) Time bomb


C

Computer Science & Information Technology

You might also like to view...

A(n) ________ or cipher is used to process the data from text into an unreadable state

Fill in the blank(s) with correct word

Computer Science & Information Technology

Match the protocol or encryption name with the feature.

A. No longer considered secure because the key used for encryption doesn’t change. B. Typically uses TKIP for encryption. C. Typically uses AES for encryption. D. Generates a different key for every transmission; however, the encryption algorithm used for its calculations is no longer considered secure. E. Current encryption algorithm used today.

Computer Science & Information Technology

A string variable can hold digits such as account numbers and zip codes.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

You use the CSS shorthand ____ property to add borders to HTML elements.

A. collapse B. margin C. lines D. border

Computer Science & Information Technology