One argument in the security community is that lack of diversity is itself a vulnerability. For example, there are two dominant browsers, Mozilla Firefox and Microsoft Internet Explorer, that are used by probably 95 percent of Internet users. What security risk does this control of the market introduce? Suppose there were three (each with a significant share of the market). If not, would four? Five? Explain your answers.

What will be an ideal response?


A security flaw in any one affects a huge number of users. With a large user population, even one-­?third of the population is large.

Computer Science & Information Technology

You might also like to view...

(Enhanced Bubble Sort) Make the following simple modifications to improve the perfor- mance of the bubble sort you developed in Exercise 19.5:

a) After the first pass, the largest value is guaranteed to be in the highest-numbered element of the vector; after the second pass, the two highest values are “in place”; and soon. Instead of making nine comparisons (for a 10-element vector) on every pass, modify the bubble sort to make only the eight necessary comparisons on the second pass, seven on the third pass, and so on. b) The data in the vector may already be in the proper order or near-proper order, so why make nine passes (of a 10-element vector) if fewer will suffice? Modify the sort to check at the end of each pass whether any swaps have been made. If none have been made, the data must already be in the proper order, so the program should terminate. If swaps have been made, at least one more pass is needed.

Computer Science & Information Technology

__________ are sites that act as gateways to the web.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What is the operation used to insert data into the stack?

A. push B. pop C. stack top D. insert

Computer Science & Information Technology

When you delete a file from a window, its name is removed from the window's content and the file is physically moved to the ____, the wastebasket icon on the desktop.

A. Trash Can B. Recycle Bin C. Shredder D. Eraser

Computer Science & Information Technology