____ is the name of a particularly nasty automated program that attacks a network by exploiting Internet Protocol (IP) broadcast addressing and other aspects of Internet operation.?
A. ?E-mail bombing
B. ?Spoofing
C. ?Smurfing
D. ?Firewalling
Answer: C
You might also like to view...
The method setRolloverIcon is used to ________.
a. Handle a key event b. Change the button text c. Change the button icon d. All of the above
Case-Based Critical Thinking QuestionsCase 5-1Stacy is in the process of organizing the files and folders on her computer. Stacy has finished organizing her computer. She is concerned that her files are not completely organized in the correct folders. Stacy has decided to create three new subfolders and needs to make duplicates of her files. Stacy needs to ____.
A. cut and paste her files to the new folders B. copy and paste her files to the new folders C. delete the files and then move them from the Recycle Bin D. copy her files to a flash drive
Which term best describes a snapshot of operating system and program files at a specific point in time that can be restored to roll back to a point in time when the operating system or applications were stable?
A. system restore B. restore point C. recovery point D. steps recorder
In the accompanying figure, item 2 points to an icon at the left of the computer screen, which is the ____.
A. toolbar B. Dock C. Finder D. menu bar