When a computer hacker uses multiple compromised computers to carry out a DDOS attack, the compromised computers are usually referred to as which of the following?
A. viruses
B. zombies
C. macros
D. cyborgs
Answer: B
You might also like to view...
The Step Into debugger command can be used to __________.
a) return from the method to the caller b) modify the code at execution time to correct a logic error c) execute the code statements in a different order to locate a bug d) view the code for a called method as it executes
Many of the functions that a laptop can perform can be accomplished on a tablet
Indicate whether the statement is true or false
The To value box in the Goal Seek dialog box contains ________
A) a cell reference from the formula that can be adjusted to achieve the goal B) a formula C) the result desired for the formula D) a function
When is it okay to touch the inside of a computer that is turned on?
A. When disassembling the computer B. When using a multimeter to measure voltage output C. When reassembling the computer D. When a qualified electronics expert or electrician is present