Computer

Q361

Most common tool used to restrict access is____________?

Q362

Measurement of fingerprints and retinal scans is called___________?

Q363

A program that gathers user information and sends it through the Internet is called:

Q364

When a logic bomb is activated by time, it is known as a____________?

Q365

The thing that eventually terminates a worm virus is a lack of:

Q367

In 1999, the Melissa virus was a widely publicised:____________?

Q368

An intentionally disruptive program that spreads is known as a_____________?

Q369

A program that performs a useful task while allowing destructive acts is a___________?

Scroll to Top