Some worms are specifically written to take advantage of newly discovered ____ in operating systems and e-mail programs before the security patch to correct that vulnerability is available.

A. scripts
B. applets
C. file indexes
D. security holes


Answer: D

Computer Science & Information Technology

You might also like to view...

Which of the following statements will print a single line containing "hello there"?

a. System.out.println("hello"); System.out.println(" there"); b. System.out.println("hello" , " there"); c. System.out.println("hello"); System.out.print(" there"); d. System.out.print("hello"); System.out.println(" there");

Computer Science & Information Technology

On a social network, a collection of posts or status updates from a person's friends is called a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

The system unit on most personal computers contains at least one hard disk, sometimes called an internal hard disk because it is not portable.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A ________ defines the criteria that should be applied when the query is run

A) WHERE clause B) SELECT clause C) JOIN clause D) FROM clause

Computer Science & Information Technology