When the database finds a match during a search of the record, that record is immediately displayed as the next record
Indicate whether the statement is true or false
FALSE
You might also like to view...
Answer the following statement(s) true (T) or false (F)
1. Information technology monitoring tracks people's activities by such measures as number of keystrokes, error rate, and number of transactions processed. 2. Spyware is software that, while purporting to serve some useful function and often fulfilling that functions, also allows Internet advertisers to display advertisements without the consent of the computer user. 3. The Trojan-horse virus hides inside other software, usually as an attachment or a downloadable file. 4. Information security is a broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization. 5. Two of the common forms of viruses discussed in the book include the Trojan-horse virus and the acceptance-of-service attack.
________ is a program that gathers information about your surfing habits without your knowledge.
A. Adware B. Ghostware C. Shareware D. Spyware