Viruses and worms are two examples of _________ attacks. Such attacks can be introduced into a system by means of a disk that contains the unwanted logic concealed in otherwise useful software. They can also be inserted into a system across a network.
Fill in the blank(s) with the appropriate word(s).
software
Computer Science & Information Technology
You might also like to view...
An AutoNumber (or counter) will increment manually when a new record is added
Indicate whether the statement is true or false
Computer Science & Information Technology
Case-Based Critical Thinking QuestionsCase 10-3Simon's Leathervane sells handmade leather clothing online. He has added some JavaScript functions to calculate how much a person has to pay before they submit the order page, but is having some trouble. In Firefox, the error console would allow him to ____ JavaScript commands.
A. locate B. add C. delete D. evaluate
Computer Science & Information Technology