You should beware of a person attempting to use your computer after you step away from it, a term referred to as which of the following?

A. shoulder surfing
B. tailgating
C. social engineering
D. session hijacking


Answer: B

Computer Science & Information Technology

You might also like to view...

A(n) _______ database uses tables to organize information.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The kind of law featured in the accompanying figure gives you the right to create a new work based on the original, known as a(n) ____ work.

A. ancillary B. extended C. derivative D. domain

Computer Science & Information Technology

What is the definition of a command?

A. a collection of unprocessed text, numbers, images, audio, and video B. a series of instructions that tells a computer what to do and how to do it C. an instruction issued by replying to a question that is displayed D. an instruction that causes a program or app to perform a specific action

Computer Science & Information Technology

Which button in the Outline Tools group do you click to quickly move the insertion point to the left margin and the Level 1 position?

A. Promote to Level 1 B. Promote C. Demote to Heading 1 D. Promote to Heading 1

Computer Science & Information Technology