Match each of the following terms to its meaning:I.Trojan horseII.pretextingIII.cookieIV.botnetV.time bombA.text file for storing personal preferences pertaining to websitesB.program that appears to be something useful or desirableC.virus that is triggered by the passage of time or on a certain dateD.creating a scenario that sounds legitimate enough that someone will trust youE.programs that run on a large number of zombie computers
Fill in the blank(s) with the appropriate word(s).
B, D, A, E, C
You might also like to view...
What would be displayed after line 8 runs?
```
1 vector
What is the output of the following code?
``` int[] myList = {1, 2, 3, 4, 5, 6}; for (int i = myList.length - 2; i >= 0; i--) { myList[i + 1] = myList[i]; } for (int e: myList) System.out.print(e + " "); ``` a. 1 2 3 4 5 6 b. 6 1 2 3 4 5 c. 6 2 3 4 5 1 d. 1 1 2 3 4 5 e. 2 3 4 5 6 1
If you suspect that a fiber-optic run has a break, which type of device would you use to determine if there is a break, and to identify the location of the break?
A. multimeter B. optical time domain reflectometer (OTDR) C. time domain reflectometer D. toner
You have just set up a new wireless network at your house, and you want to determine whether your Linux laptop has connected to it and obtained a valid IP address. What command will give you the information you need?
What will be an ideal response?