The term “computer virus” is attributed to __________.
A. Herman Hollerith B. Fred Cohen
C. Charles Babbage D. Albert Einstein
B. Fred Cohen
Computer Science & Information Technology
You might also like to view...
Which statement about strtok is false?
a) It breaks a string into tokens. b) Subsequent calls to continue tokenizing the same string contain NULL as the first argument. c) The length of the current token is returned by each call. d) If there are no more tokens when the function is called, NULL is returned.
Computer Science & Information Technology
Creating a blueprint by looking at the paths taken by organizations similar to the one whose plan you are developing is known as which of the following?
A. benchmarking B. corporate espionage C. baselining D. due diligence
Computer Science & Information Technology