Computer

Q42

The thing that eventually terminates a worm virus is a lack of:

Q43

When a logic bomb is activated by time, it is known as a____________?

Q44

A program that gathers user information and sends it through the Internet is called:

Q45

Measurement of fingerprints and retinal scans is called___________?

Q46

Most common tool used to restrict access is____________?

Q47

Hardware/software that protects networks is called a(n)___________?

Q49

To prevent data loss during power failure use a(n)_____________?

Q50

Any crime using computer technology is called___________?

Scroll to Top