Which of the following is not a type of cyber-attack?
(a) Kerberos.
(b) A trojan horse.
(c) A virus.
(d) Denial of service.
(a) Kerberos.
Computer Science & Information Technology
You might also like to view...
Visual C# apps can have multiple threads of execution, where each thread has its own ________ stack, allowing it to execute concurrently with other threads while sharing with them application-wide resources such as memory and processors. This capability is called multithreading.
a) method-call b) attribute c) memory d) application
Computer Science & Information Technology
Which of the following is the escape sequence that represents the newline character?
A. '\endl' B. '/t' C. '\n' D. '\t'
Computer Science & Information Technology