Question
What is a technique used to gain unauthorized access to
computers, whereby the intruder sends messages to a computer with an address indicating that the message is coming from a trusted host?Solution
IP spoofing involves sending messages to a computer with an address that appears to come from a trusted source.
Which one does not allow Execution due to any waiting event?
Before granting access a computer checks from the database which of the following?
Process of adapting software is known as –
What is an email attachment?
When a computer stops suddenly, it is referred to as a
What is Android Honeycomb?
Which of the following is used to open a web page?
Thumbnails is a
The Apple equivalent of a motherboard is _______.
CTRL + J is the shortcut key used in