题目内容

Programs that come into a computer system disguised as something else are called:

A. Trojan horses
B. viruses
C. web bugs
D. zombies

查看答案
更多问题

The use of the Internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person is known as:

A. cyberbullying
B. online harassment
C. social networking discrimination
D. unethical communication

Special hardware and software used to control access to a corporation’s private network is known as a(n):

A. antivirus program
B. communication gate
C. firewall
D. spyware removal program

To prevent copyright violations, corporations often use:

ACT
B. DRM
C. VPN
D. WPA2

科学发展观的核心立场是()

A. 经济建设为中心
B. 实现又好又快的发展
C. 以人为本
D. 发展质量和效益至上

答案查题题库