A(n) _______ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.
A. Trojan horse
B. dictionary
C. web bug
D. denial of service
查看答案
_______ is representing some other person’s work and ideas as your own without giving credit to the original source.
A. Blogging
B. Phishing
C. Plagiarism
D. Key logging
Which part of an information system consists of the rules or guidelines for people to follow?
A. People
B. Procedures
C. Internet
Data
The equipment that processes data in order to create information is called the _______.
A. typology
B. compiler
C. hardware
D. software
In most cases, the word "software" is interchangeable with the word _______.
A. procedure
B. application
C. program
D. computer