Using a(n) _______________, hackers can probe from the network to see if your computer is vulnerable to attack.
Fill in the blank(s) with the appropriate word(s).
port scanner
correct
Computer Science & Information Technology
You might also like to view...
The relationship between tables, based on common fields, is represented in a query by a(n):
A) join. B) merge. C) parameter. D) expression.
Computer Science & Information Technology
All modern browsers can play MPEG-4 videos encoded with the __________ codec.
A. H.264 B. Theora C. VP8 D. VP9
Computer Science & Information Technology
A section that displays at the bottom of each page in a form or report.
What will be an ideal response?
Computer Science & Information Technology
When you drag a layer up or down to reposition it in the hierarchy, a thick horizontal line identifies where the layer will be repositioned.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology