Which of the following was NOT e-evidence used to track the creator of the Melissa virus?
A) Hardware ID B) Key signature in e-mails from the perpetrator
C) Operating system event log D) AOL return address
C
You might also like to view...
Which of the following is the version of func that is called?
``` class B { public: // other members void func(); // other members }; void B::func() { /* body */} class D: public B { public: // other members void func(); // other members }; void D::func() { /* body */} D dObj; ``` Make the following call using dObj as calling object: ``` dObj.func(); ``` a) B::func() b) D::func() c) Neither d) Both e) This is illegal. The base class func() is inherited in the derived class. For this reason, it is illegal to have a function defined in a base class and in a derived class having the same signature.
____ tools are for making free-form selections.
A. Marquee B. Lasso C. Selection D. Lateral
A manual page break is a break between pages that is inserted to control the flow of text
Indicate whether the statement is true or false
When working with co-workers and supervisors, which of the following is a good practice?
A. if you have a problem with a co-worker, first discuss it with other co-workers B. if you need to give bad news or criticism, use email to lessen the blow C. be professional by putting business matters over personal matters D. never tell your boss you can't take on a new project, even if it's beyond your skills