The ________ program exploited security holes in the Unix operating system, infecting 10 percent of all computers connected to the Internet

Fill in the blank(s) with the appropriate word(s).


Answer: Morris worm

Computer Science & Information Technology

You might also like to view...

A _________ is a struct or class object that has one or more member variables that are pointer variables.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

In C#, an exception handler is written with the ____________ statement.

a. try-catch b. catch-try c. run-break d. break-run

Computer Science & Information Technology

In Windows Media Player, the terms picture and photograph are different types of files

Indicate whether the statement is true or false

Computer Science & Information Technology

In a(n) ____, a list is sorted by selecting elements in the list, one at a time, and moving them to their proper positions.

A. quicksort B. insertion sort C. selection sort D. bubble sort

Computer Science & Information Technology