What type of undocumented yet benign hidden feature launches after a special set of commands, key combinations, or mouse clicks?

A. Trojan horse
B. virus
C. bug
D. Easter egg


Answer: D

Computer Science & Information Technology

You might also like to view...

When a program __________ a file, it disconnects the file from the program.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

By default, a link currently being clicked or activated is underlined and blue.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The power of a database system comes with the ability to link ________ together

Fill in the blank(s) with correct word

Computer Science & Information Technology

In reviewing the Auto Scaling events for your application you notice that your application is scaling up and down multiple times in the same hour. What design choice could you make to optimize for cost while preserving elasticity?

A. Modify the Auto Scaling policy to use scheduled scaling actions B. Modify the Auto Scaling group termination policy to terminate the oldest instance first. C. Modify the Auto Scaling group cool-down timers. D. Modify the Amazon CloudWatch alarm period that triggers your Auto Scaling scale down policy. E. Modify the Auto Scaling group termination policy to terminate the newest instance first.

Computer Science & Information Technology