subject

Match each of the following terms to its meaning: i. trojan horse ii. pretexting iii. cookie iv. botnet v. time bomb a. text file for storing personal preferences pertaining to websites b. program that appears to be something useful or desirable c. virus that is triggered by the passage of time or on a certain date d. creating a scenario that sounds legitimate enough that someone will trust you e. programs that run on a large number of zombie computers

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 11:00
What are two of the most common reasons that peolpe who need mental health care do not access it?
Answers: 1
question
Computers and Technology, 22.06.2019 23:30
In my email i got a message it says a quick message and in message details on who its from its says nicole and under nicole is [email protected] -
Answers: 1
question
Computers and Technology, 23.06.2019 15:10
What role did women fill during world war ii?
Answers: 1
question
Computers and Technology, 23.06.2019 18:20
What is wi-fi infrastructure? a metropolitan area network that uses radio signals to transmit and receive data a communications technology aimed at providing high-speed wireless data over metropolitan area networks a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves includes the inner workings of a wi-fi service or utility, including the signal transmitters, towers, or poles and additional equipment required to send out a wi-fi signal
Answers: 2
You know the right answer?
Match each of the following terms to its meaning: i. trojan horse ii. pretexting iii. cookie iv. bo...
Questions
question
Biology, 14.04.2020 21:05
question
Mathematics, 14.04.2020 21:05
question
Mathematics, 14.04.2020 21:05
Questions on the website: 13722363