Which of the following is a set of step-by-step instructions that accomplish a task?
A. algorithm
B. mnemonic
C. heuristic
D. loop
Answer: A
You might also like to view...
Jerrod is evaluating different PCs before purchasing one. Jerrod knows that the ____ is the circuitry that transports data to and from the processor.
A. SDRAM B. FSB C. EEPROM D. BIOS
When using the _____ box you simply type a keyword.??
Fill in the blank(s) with the appropriate word(s).
DoS attacks against VoIP can be successful even if they increase latency only slightly.
True False
Match each item with a statement below:
A. defines what you can trust, how you are going to build a trust relationship, and when to apply and verify the trust B. process of connecting the peer trust anchors in a distributed trust model C. the most popular PKI trust model used today D. decentralizes the task of trust management to the users E. uncertainty concerning the occurrence of a loss F. sometimes referred as organizational survey assessment G. provides a formal way of describing the security of systems based on various attacks H. standard solutions to common problems in software design I. speed up security analysis by providing tested and proven problem/solution pairs