Which of the following is NOT an example of malware?
A. trojan horses
B. zombies
C. vaporware
D. worms
Answer: C
You might also like to view...
Which of the following performs an unboxing conversion? Assume x refers to an Integer object.
a. int y = x; b. Integer y = x; c. Neither of the above. d. Both of the above.
Consider the following relations for a database that keeps track of student enrollment in courses and the books adopted for each course:
STUDENT (SSN, Name, Major, Bdate) COURSE (Course#, Quarter, Grade) ENROLL (SSN, Course#, Quarter, Grade) BOOK_ADOPTION (Course#, Quarter, Book_ISBN) TEXT (Book_ISBN, Book_Title, Publisher, Author) Specify the foreign keys for this schema, stating any assumptions you make.
What serves the site to anyone who visits the domain in a browser?
a. Domain name b. Web host c. Name server d. FTP client
Java performs automatic __________ of objects that are no longer referenced in a program.
a. memory distribution. b. garbage collection. c. storage compression. d. trash aggregation.