题目内容

Browsers store the locations of sites visited in a:

A. history file
B. menu
C. tool bar
D. firewall

查看答案
更多问题

The browser mode that ensures your browsing activity is not recorded.

A. detect
B. insert
C. privacy
D. sleep

The information that people voluntarily post in social networking sites, blogs, andphoto- and video-sharing sites is used to create their:

A. access approval
B. firewall
C. online identity
D. phish

Computer criminals who create and distribute malicious programs.

A. antispies
B. crackers
C. cyber traders
D. identity thieves

Programs that come into a computer system disguised as something else are called:

A. Trojan horses
B. viruses
C. web bugs
D. zombies

答案查题题库