Define Trojan horse, e-mail bomb or denial of service attack, and botnet
What will be an ideal response?
A Trojan horse appears to be a normal program, such as computer game, but "conceals malicious functions." An e-mail bomb or denial-of-service attack sends so much e-mail to one address that the server stops working. A botnet is comprised of a collection of automatic software robots. Botnets can remove software or send spam. Social media, such as Facebook, is now a major way of spreading harmful computer programs. Also, mobile devices may become targets.
You might also like to view...
The sign-out sheet allows the receptionist to maintain a continuous record of all patients who come into the office.
Answer the following statement true (T) or false (F)
Pharmacists should be aware of any prescription that appears to be:
a. inpatient or outpatient b. very cost-effective for the patient c. printed on fax paper d. outside the scope of practice of the prescriber
Diuretic combinations may be used in an attempt to obtain a(n)_______________effect in patients not responding to one agent
a. synergistic b. complementary c. potency d. ototoxic
Copayments usually apply to which of the following services?
a. Surgery b. Office visits c. Laboratory services d. All of the above