When a computer is the ____ of an attack, it is used as an active tool to conduct the attack.
A. subject
B. victim
C. object
D. direction
Answer: A
You might also like to view...
Answer the following statements true (T) or false (F)
1. The keyword static is used in a static function declaration in a class but not in the function definition. 2. Vector assignment is well behaved. 3. The functions or data members declared in the private: section of a class can be accessed only in the definition those functions declared in that class. Note that friend functions are also declared (but not defined) in the class to which they are friends, so they also have access to private as well as public members. 4. The set of integers ranging from -MAXINT to MAXINT make up the int data type.
In regard to spelling and grammar in Office 2010, it is important to know that, in general,:
A) all Office applications check your spelling and grammar as you type. B) you turn on the Spelling and Grammar features in all applications. C) Word and PowerPoint check spelling and grammar as you type; Access and Excel do not. D) only a small selection of words will be checked as you type; the rest must be accessed through the Spelling and Grammar features.
Use the __________ property to align text within an element
a. align b. font-align c. text-align d. you cannot align text with CSS
Ever since the network infrastructure was updated, a manager's laptop has slow connectivity no matter where the manager is within the building. What should the technician consider upgrading or replacing?
A) Processor B) Hard drive C) RAM D) Wireless NIC