A technique in which one system models the behavior of another system is called ____.

A. imitation
B. recursion
C. simulation
D. stimulation

Answer: C

Computer Science & Information Technology

You might also like to view...

By default a user on a Windows 8.1 domain-joined computer is required to press CTRL+ALT+DEL to log on

Indicate whether the statement is true or false

Computer Science & Information Technology

With a __________ attack the attacker is given access to a set of messages and their signatures.

A. known message B. key-only C. directed chosen message D. generic chosen message

Computer Science & Information Technology