A ____ is a program that hides in a computer and allows someone from a remote location to take full control of the computer.
A. virus
B. Trojan horse
C. worm
D. rootkit
Answer: D
You might also like to view...
All of the following are reasons to use recursion except:
a. An iterative solution is not apparent. b. The resulting program is easier to debug. c. It more naturally mirrors the problem. d. It maximizes execution performance.
Explain why this estimate should be adjusted to take project, personnel, product and organizational factors into account. Suggest four factors that might have significant effects on the initial COCOMO estimate and propose possible values for these factors. Justify why you have included each factor.
A software manager is in charge of the development of a safety-critical software system, which is designed to control a radiotherapy machine to treat patients suffering from cancer. This system is embedded in the machine and must run on a special-purpose processor with a fixed amount of memory (256 Mbytes). The machine communicates with a patient database system to obtain the details of the patient and, after treatment, automatically records the radiation dose delivered and other treatment details in the database. The COCOMO method is used to estimate the effort required to develop this system and an estimate of 26 person-months is computed. All cost driver multipliers were set to 1 when making this estimate.
A ____ is a predefined procedure that performs a specific task and then returns a value after completing the task.
A. sub B. function C. method D. routine
IPv6 is an expanded system that uses 64 bits of data per address and will meet the need for additional addresses for the foreseeable future
Indicate whether the statement is true or false