题目内容

A(n) _______ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.

A. Trojan horse
B. dictionary
C. web bug
D. denial of service

查看答案
更多问题

_______ is representing some other person’s work and ideas as your own without giving credit to the original source.

A. Blogging
B. Phishing
C. Plagiarism
D. Key logging

Which part of an information system consists of the rules or guidelines for people to follow?

A. People
B. Procedures
C. Internet
Data

The equipment that processes data in order to create information is called the _______.

A. typology
B. compiler
C. hardware
D. software

In most cases, the word "software" is interchangeable with the word _______.

A. procedure
B. application
C. program
D. computer

答案查题题库