________ viruses are often transmitted by a flash drive left in a USB port
A) Logic bomb B) Macro C) Boot-sector D) Time bomb
C
You might also like to view...
A(n) ________ or cipher is used to process the data from text into an unreadable state
Fill in the blank(s) with correct word
Match the protocol or encryption name with the feature.
A. No longer considered secure because the key used for encryption doesn’t change. B. Typically uses TKIP for encryption. C. Typically uses AES for encryption. D. Generates a different key for every transmission; however, the encryption algorithm used for its calculations is no longer considered secure. E. Current encryption algorithm used today.
A string variable can hold digits such as account numbers and zip codes.
Answer the following statement true (T) or false (F)
You use the CSS shorthand ____ property to add borders to HTML elements.
A. collapse B. margin C. lines D. border