You should beware of a person attempting to use your computer after you step away from it, a term referred to as which of the following?
A. shoulder surfing
B. tailgating
C. social engineering
D. session hijacking
Answer: B
You might also like to view...
A(n) _______ database uses tables to organize information.
Fill in the blank(s) with the appropriate word(s).
The kind of law featured in the accompanying figure gives you the right to create a new work based on the original, known as a(n) ____ work.
A. ancillary B. extended C. derivative D. domain
What is the definition of a command?
A. a collection of unprocessed text, numbers, images, audio, and video B. a series of instructions that tells a computer what to do and how to do it C. an instruction issued by replying to a question that is displayed D. an instruction that causes a program or app to perform a specific action
Which button in the Outline Tools group do you click to quickly move the insertion point to the left margin and the Level 1 position?
A. Promote to Level 1 B. Promote C. Demote to Heading 1 D. Promote to Heading 1