Which of the following is used to close security holes discovered in an operating system or other program?

A) patch B) malware C) ActiveX D) antivirus


A

Computer Science & Information Technology

You might also like to view...

Discuss the difference between pessimistic and optimistic concurrency control?

What will be an ideal response?

Computer Science & Information Technology

The example on page 130 shows that the man pages for crontab appear in Sections 1 and 5 of the system manual. Explain how you can use man to determine which sections of the system manual contain a manual page with a given name.

What will be an ideal response?

Computer Science & Information Technology

Describe the behavior of an Ethernet bridge, comparing it to a repeater.

What will be an ideal response?

Computer Science & Information Technology

?Data ______ tools can take raw data and immediately provide a rich visual image.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology