A(n) _______ is someone who gains unauthorized access to computer systems.
A. cracker
B. cookie
C. hacker
D. logger
查看答案
_______ are invisible images or HTML code hidden within a web page or e-mail message and are used to transmit information without your knowledge.
A. Loggers
B. Cookies
C. History files
D. Web bugs
_______ are programs that migrate through networks and operating systems and attach themselves to various other programs and databases.
A. Viruses
B. Zombies
C. Web bugs
DoS
A(n) _______ attempts to slow down or stop a computer system or network by sending repetitive requests for information.
A. zombie
B. DoS attack
C. worm
D. Trojan horse
A deceptive act, using the Internet, to trick people into spending their money and time for no gain is called an Internet _______.
A. worm
B. cookie
C. scam
D. malware