Match the hacking terminology with its meaning
1. Wetware a. a subspecies of logic bomb that is triggered by reaching some predetermined time or is set to go off in the event that a programmer is fired and not available to suppress action
2. Time bomb b. a term traditionally used to refer to the method of cracking passwords by manually entering all possible key combinations
3. Bit bucket c. an individual hired by a company to test its security systems by attempting to violate them
4. Brute force d. the final destination of discarded, lost, or destroyed data
5. Sneaker e. a term used to refer to humans operating computers (as opposed to hardware and software)
Answer: 1. e
2. a
3. d
4. b
5. c
You might also like to view...
The processor has how many moving parts?
a. too many to count b. 8 c. 2 d. 0
A direct benefit of setting table relationships is that it can assist the database developer and the users when creating a single-table record source
Indicate whether the statement is true or false
Your bibliography should only list the references that you cited in parenthetical terms in your paper
Indicate whether the statement is true or false
Match each logical operator and media feature with its description.
A. and B. , C. not D. min-width E. max-width