A __________ uses multiple methods of infection or propagation to maximize the speed of contagion and the severity of the attack.
Fill in the blank(s) with the appropriate word(s).
blended attack
Computer Science & Information Technology
You might also like to view...
Character-based operating systems require use of the ________ for input
Fill in the blank(s) with correct word
Computer Science & Information Technology
The Group, Sort, and Total pane allows you to open group header and footer sections.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology