Using your computer for non-work activities while you are being paid to work is known as ________.
A. cyberloafing
B. cybersleeping
C. cyberlazing
D. cyberbreaking
Answer: A
Computer Science & Information Technology
You might also like to view...
Consider a field F defined by a polynomial f(x). An element b contained in F is called a __________ of the polynomial if f(b) = 0.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Which of the following is the command to view the mac address table?
What will be an ideal response?
Computer Science & Information Technology
Which of the following is the final step for an incident response tabletop exercise?
A) Execution B) Preparation C) Report D) Analysis
Computer Science & Information Technology
Does rmdir(2) succeed? If so, what happens when the program tries to read the current directory?
Assume the following sequence of commands occurs in a program:
Computer Science & Information Technology