Any weakness in a PC that is connected to the Internet or other network that permits an outside attacker to violate the integrity of a system is called a(n) ____________________.

Fill in the blank(s) with the appropriate word(s).


vulnerabilities

Computer Science & Information Technology

You might also like to view...

To sort and filter data on an Excel worksheet, click the Sort & Filter button on the ________ tab

A) FILE B) HOME C) DESIGN D) PAGE LAYOUT

Computer Science & Information Technology

You can press ____ to open the Convert to Symbol dialog box.

A. [F7] B. [F8] C. [Esc] D. [Ctrl]

Computer Science & Information Technology

In the VBA statement: MsgBox("Do you really want to quit Access?",4,"Confirm please")=6, what does the third argument define?

A) The text inside the message box B) The text in the message title bar C) This statement only has two arguments D) The number of lines to insert

Computer Science & Information Technology

A Dreamweaver site ____________________ is a set of defining characteristics for a local site, plus information on how the local site corresponds to a remote site.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology