The first rule of computer security is to check ___________
a. Patches
b. Ports
c. Policies
d. None of the above
Answer A. The operating system, database management systems, development tools, and Internet browsers should be checked for patches.
You might also like to view...
If an app needs to perform a derived-class-specific operation on a derived class object reference by a base class variable, the app must first cast the base class reference to a derived class reference through a technique known as _________.
a) downcasting b) upcasting c) decreasecasting d) increasecasting
Expert systems capture the knowledge of human experts and store it in a knowledge base.
Answer the following statement true (T) or false (F)
Here are the results from a series of card-sorting sessions. The first item in each group is the name that users gave to the group. The remaining items represent content pages. A hierarchical navigation system is appropriate for this information. Sketch a global navigation system that has two levels of horizontal navigation bars. You only need to sketch the top-level navigation bar once, but your sketch should give an indication of what each secondary navigation bar will contain.
A group of statements that executes as a single unit is a(n) ____.
A. module B. unit C. bunch D. block