Match each of the following terms to its meaning:I.Trojan horseII.pretextingIII.cookieIV.botnetV.time bombA.text file for storing personal preferences pertaining to websitesB.program that appears to be something useful or desirableC.virus that is triggered by the passage of time or on a certain dateD.creating a scenario that sounds legitimate enough that someone will trust youE.programs that run on a large number of zombie computers

Fill in the blank(s) with the appropriate word(s).


B, D, A, E, C

Computer Science & Information Technology

You might also like to view...

What would be displayed after line 8 runs?

``` 1 vector vNums; 2 vNums.push_back(10); 3 vNums.push_back(5); 4 vNums.push_back(15); 5 vNums.push_back(25); 6 cout << vNums.size(); 7 vNums.pop_back(); 8 cout << vNums.at(2); 9 vNums.pop_back(); 10 vNums.pop_back(); 11 vNums.pop_back();``` A. 10 B. 5 C. 15 D. 25

Computer Science & Information Technology

What is the output of the following code?

``` int[] myList = {1, 2, 3, 4, 5, 6}; for (int i = myList.length - 2; i >= 0; i--) { myList[i + 1] = myList[i]; } for (int e: myList) System.out.print(e + " "); ``` a. 1 2 3 4 5 6 b. 6 1 2 3 4 5 c. 6 2 3 4 5 1 d. 1 1 2 3 4 5 e. 2 3 4 5 6 1

Computer Science & Information Technology

If you suspect that a fiber-optic run has a break, which type of device would you use to determine if there is a break, and to identify the location of the break?

A. multimeter B. optical time domain reflectometer (OTDR) C. time domain reflectometer D. toner

Computer Science & Information Technology

You have just set up a new wireless network at your house, and you want to determine whether your Linux laptop has connected to it and obtained a valid IP address. What command will give you the information you need?

What will be an ideal response?

Computer Science & Information Technology