An attacker's use of a laptop while driving around looking for open wireless connections is often called war __________.

Fill in the blank(s) with the appropriate word(s).

driving

Computer Science & Information Technology

You might also like to view...

An individual could use the ________ tab of the Internet Options dialog box in Internet Explorer to delete temporary Internet files

Fill in the blank(s) with correct word

Computer Science & Information Technology

A ________ component is considered a state button.

a) JRadioButton b) JCheckBox c) JButton d) Both a and b.

Computer Science & Information Technology