Which of the following was NOT e-evidence used to track the creator of the Melissa virus?

A) Hardware ID B) Key signature in e-mails from the perpetrator
C) Operating system event log D) AOL return address


C

Computer Science & Information Technology

You might also like to view...

Which of the following is the version of func that is called?

``` class B { public: // other members void func(); // other members }; void B::func() { /* body */} class D: public B { public: // other members void func(); // other members }; void D::func() { /* body */} D dObj; ``` Make the following call using dObj as calling object: ``` dObj.func(); ``` a) B::func() b) D::func() c) Neither d) Both e) This is illegal. The base class func() is inherited in the derived class. For this reason, it is illegal to have a function defined in a base class and in a derived class having the same signature.

Computer Science & Information Technology

____ tools are for making free-form selections.

A. Marquee B. Lasso C. Selection D. Lateral

Computer Science & Information Technology

A manual page break is a break between pages that is inserted to control the flow of text

Indicate whether the statement is true or false

Computer Science & Information Technology

When working with co-workers and supervisors, which of the following is a good practice?

A. if you have a problem with a co-worker, first discuss it with other co-workers B. if you need to give bad news or criticism, use email to lessen the blow C. be professional by putting business matters over personal matters D. never tell your boss you can't take on a new project, even if it's beyond your skills

Computer Science & Information Technology