Vulnerabilities in an operating system or program that enable malware to infect a computer are called ________
Fill in the blank(s) with correct word
security holes
Computer Science & Information Technology
You might also like to view...
What is the purpose of Structured Query Language (SQL)? p.000
What will be an ideal response?
Computer Science & Information Technology
Which of the following lighting uses a lamp consisting of an ultraviolet light source, such as mercury vapor, contained in a fused-silica bulb that transmits ultraviolet light with little absorption?
A. Fluorescent B. Mercury vapor C. Sodium vapor D. Quartz
Computer Science & Information Technology