A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge
A) rootkit B) logic bomb
C) denial of service (DoS) D) zombie
A
You might also like to view...
__________ is the default upper bound of a type parameter.
a. String. b. Comparable. c. Class. d. Object.
A file server uses caching, and achieves a hit rate of 80%. File operations in the server cost 5 ms of CPU time when the server finds the requested block in the cache, and take an additional 15 ms of disk I/O time otherwise. Explaining any assumptions you make, estimate the server’s throughput capacity (average requests/sec) if it is: i) single-threaded; ii) two-threaded, running on a single processor; iii) two-threaded, running on a two-processor computer.
What will be an ideal response?
In the IA-32 architecture, the ________ register typically stores a process’s code segment selector (which typically corresponds to the segment containing its executable instructions).
a) SS b) FS c) ES d) CS
Function call overhead is justified because it can reduce a program's ____________________ substantially.
Fill in the blank(s) with the appropriate word(s).