A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge

A) rootkit B) logic bomb
C) denial of service (DoS) D) zombie


A

Computer Science & Information Technology

You might also like to view...

__________ is the default upper bound of a type parameter.

a. String. b. Comparable. c. Class. d. Object.

Computer Science & Information Technology

A file server uses caching, and achieves a hit rate of 80%. File operations in the server cost 5 ms of CPU time when the server finds the requested block in the cache, and take an additional 15 ms of disk I/O time otherwise. Explaining any assumptions you make, estimate the server’s throughput capacity (average requests/sec) if it is: i) single-threaded; ii) two-threaded, running on a single processor; iii) two-threaded, running on a two-processor computer.

What will be an ideal response?

Computer Science & Information Technology

In the IA-32 architecture, the ________ register typically stores a process’s code segment selector (which typically corresponds to the segment containing its executable instructions).

a) SS b) FS c) ES d) CS

Computer Science & Information Technology

Function call overhead is justified because it can reduce a program's ____________________ substantially.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology