Virus ________ are common in email messages and can trick you into behavior that can be harmful

Fill in the blank(s) with correct word

hoaxes

Computer Science & Information Technology

You might also like to view...

Windows ________ can prevent hackers or malicious software from gaining access to your computer through a network or the Internet

A) Journal B) Edge C) Firewall D) Defender

Computer Science & Information Technology

When you need an item in a program, but the program does not change the item's value, you can declare the item to be a constant by placing the word ____ before its declaration.

A. final B. const C. extern D. static

Computer Science & Information Technology