A computer is the ____________________ of an attack when it is the entity being targeted.

Fill in the blank(s) with the appropriate word(s).


object

Computer Science & Information Technology

You might also like to view...

An operating system is an example of system software.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A view that shows the full-screen slide show on one monitor while enabling the presenter to view a preview of the next slide, notes, and a timer on another monitor is:

a. Slide Show view b. Reading view c. Presenter View

Computer Science & Information Technology

Which of the following is not a proper way to address the issue of having too many rows in the table?

A) Have a printed handout of the entire table available. B) Limit your list to whatever will allow the font size to stay readable. C) Show the top 5 instead of the entire list. D) Show the entire table, but use the zoom control when needed during the presentation.

Computer Science & Information Technology

Which of the following virus types can change its signature every time it infects a new file?

a. Polymorphic virus b. RAM virus c. Multipartite virus d. Sparse infection virus

Computer Science & Information Technology