A virus attack is also known as a ________
A) logic bomb B) moneyload C) time bomb D) payload
D
You might also like to view...
During which type of DoS can the attacker use a transmitter to flood the airwaves in the vicinity of the wireless network?
a. Authentication flood attack b. Deauthentication flood attack c. Network jamming attack d. Equipment destruction attack
Panels are _________________________ when they display only their tab.
Fill in the blank(s) with the appropriate word(s).
In the number 3109, the 9 is referred to as the _________.
A. most significant digit B. least significant digit C. radix D. base
How is a crosstab query different from other queries?
A) You can only reference one object (table or query) as the data source B) You can use records from several objects in a crosstab query C) You can preview the data before finalizing the query D) You can select a data source with several grouping fields