Which of the following is used to close security holes discovered in an operating system or other program?
A) patch B) malware C) ActiveX D) antivirus
A
Computer Science & Information Technology
You might also like to view...
Discuss the difference between pessimistic and optimistic concurrency control?
What will be an ideal response?
Computer Science & Information Technology
The example on page 130 shows that the man pages for crontab appear in Sections 1 and 5 of the system manual. Explain how you can use man to determine which sections of the system manual contain a manual page with a given name.
What will be an ideal response?
Computer Science & Information Technology
Describe the behavior of an Ethernet bridge, comparing it to a repeater.
What will be an ideal response?
Computer Science & Information Technology
?Data ______ tools can take raw data and immediately provide a rich visual image.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology