The first rule of computer security is to check ___________

a. Patches
b. Ports
c. Policies
d. None of the above


Answer A. The operating system, database management systems, development tools, and Internet browsers should be checked for patches.

Computer Science & Information Technology

You might also like to view...

If an app needs to perform a derived-class-specific operation on a derived class object reference by a base class variable, the app must first cast the base class reference to a derived class reference through a technique known as _________.

a) downcasting b) upcasting c) decreasecasting d) increasecasting

Computer Science & Information Technology

Expert systems capture the knowledge of human experts and store it in a knowledge base.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Here are the results from a series of card-sorting sessions. The first item in each group is the name that users gave to the group. The remaining items represent content pages. A hierarchical navigation system is appropriate for this information. Sketch a global navigation system that has two levels of horizontal navigation bars. You only need to sketch the top-level navigation bar once, but your sketch should give an indication of what each secondary navigation bar will contain.

Computer Science & Information Technology

A group of statements that executes as a single unit is a(n) ____.

A. module B. unit C. bunch D. block

Computer Science & Information Technology