Vulnerabilities in an operating system or program that enable malware to infect a computer are called ________

Fill in the blank(s) with correct word

security holes

Computer Science & Information Technology

You might also like to view...

What is the purpose of Structured Query Language (SQL)? p.000

What will be an ideal response?

Computer Science & Information Technology

Which of the following lighting uses a lamp consisting of an ultraviolet light source, such as mercury vapor, contained in a fused-silica bulb that transmits ultraviolet light with little absorption?

A. Fluorescent B. Mercury vapor C. Sodium vapor D. Quartz

Computer Science & Information Technology