COGNITIVE ASSESSMENT
What is the general term for programs that act without a user's knowledge and deliberately alter the computer's operations?
A. malware
B. cybersoft
C. evilapp
D. viralware
Answer: A
You might also like to view...
How do methods setIn, setOut and setErr affect the standard input, output and error streams?
a. They output data to the standard input, output and error streams. b. They provide the only way to access the standard input, output and error streams. c. They redirect the standard input, output and error streams. d. They empty the standard input, output and error streams.
A __________ is an individual who seizes supervisory control of the system and uses this control to evade auditing and access controls or to suppress audit collection.
A) misfeasor B) clandestine user C) superuser D) masquerader
Users can connect to Facebook over the Internet, via Internet Explorer or some other web browser, or from a smartphone or other mobile device
Indicate whether the statement is true or false
Complex code is better for the development team.
Answer the following statement true (T) or false (F)