A ____ program creates fake packets and flood the wireless network.
A. MAC
B. packet sniffer
C. packet generator
D. CSMA/CA
Answer: C
You might also like to view...
The ____ handles computer crimes that are categorized as felonies.
A. FBI B. U.S. Secret Service C. U.S. Treasury Department D. Securities and Exchange Commission
In the Sound Byte, we examined a program called Tickle where the programmer used the draw() routine to ________
A) draw a line on the screen B) find the mouse pointer and move the text "tickle" by a random amount C) draw a loop at the location of the mouse pointer D) draw a blank screen to start a new iteration of the sketch
The debugger command ______________ allows you to “peek into the computer” and look at the value of a variable.
a) value b) variable c) print d) peek
The Report ________ section of a report is used for report totals and other summary information
A) Page Header B) Header C) Footer D) Detail