Using your computer for non-work activities while you are being paid to work is known as ________.

A. cyberloafing
B. cybersleeping
C. cyberlazing
D. cyberbreaking


Answer: A

Computer Science & Information Technology

You might also like to view...

Consider a field F defined by a polynomial f(x). An element b contained in F is called a __________ of the polynomial if f(b) = 0.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following is the command to view the mac address table?

What will be an ideal response?

Computer Science & Information Technology

Which of the following is the final step for an incident response tabletop exercise?

A) Execution B) Preparation C) Report D) Analysis

Computer Science & Information Technology

Does rmdir(2) succeed? If so, what happens when the program tries to read the current directory?

Assume the following sequence of commands occurs in a program:

Computer Science & Information Technology