You should beware of a person attempting to use your computer after you step away from it, a term referred to as which of the following?
A. shoulder surfing
B. tailgating
C. social engineering
D. session hijacking
Answer: B
Computer Science & Information Technology
You might also like to view...
________ and ________ run slower when they are applied to large arrays.
a) linear search, binary search b) linear search, bubble sort c) binary search, bubble sort d) linear – bubble search, binary - linear sort
Computer Science & Information Technology
Some computer systems generate random passwords that are very difficult to guess, but are also hard to remember.?
Answer the following statement true (T) or false (F)
Computer Science & Information Technology