The ________ program exploited security holes in the Unix operating system, infecting 10 percent of all computers connected to the Internet
Fill in the blank(s) with the appropriate word(s).
Answer: Morris worm
Computer Science & Information Technology
You might also like to view...
A _________ is a struct or class object that has one or more member variables that are pointer variables.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
In C#, an exception handler is written with the ____________ statement.
a. try-catch b. catch-try c. run-break d. break-run
Computer Science & Information Technology
In Windows Media Player, the terms picture and photograph are different types of files
Indicate whether the statement is true or false
Computer Science & Information Technology
In a(n) ____, a list is sorted by selecting elements in the list, one at a time, and moving them to their proper positions.
A. quicksort B. insertion sort C. selection sort D. bubble sort
Computer Science & Information Technology