Viruses and worms are two examples of _________ attacks. Such attacks can be introduced into a system by means of a disk that contains the unwanted logic concealed in otherwise useful software. They can also be inserted into a system across a network.

Fill in the blank(s) with the appropriate word(s).

software

Computer Science & Information Technology

You might also like to view...

An AutoNumber (or counter) will increment manually when a new record is added

Indicate whether the statement is true or false

Computer Science & Information Technology

Case-Based Critical Thinking QuestionsCase 10-3Simon's Leathervane sells handmade leather clothing online. He has added some JavaScript functions to calculate how much a person has to pay before they submit the order page, but is having some trouble. In Firefox, the error console would allow him to ____ JavaScript commands.

A. locate B. add C. delete D. evaluate

Computer Science & Information Technology