which malicious code was contained inside apparently harmless data in such a way that it got control and did d
Johns computer has been attacked by a program in which malicious code was contained inside apparently harmless data in such a way that it got control and did damage. What is this type of program called?
If a systems development life cycle methodology is inadequate, the most serious risk is likely to be that the
If a systems development life cycle methodology is inadequate, the most serious risk is likely to be that the project:
Which of the following are incorrect characteristics of ADO?
ActiveX Data Objects (ADO) is an API that allows applications to access back-end database systems. It is a set of ODBC interfaces that exposes the functionality of data sources through accessible objects. Which of the following are incorrect characteristics of ADO?
i.It’s a low-level data access programming interface to an underlying data access technology (such as OLE DB).
ii. It’s a set of COM objects for accessing data sources, not just database access.
iii. It allows a developer to write programs that access data, without knowing howthe database is implemented.
iv. SQL commands are required to access a database when using ADO.
which of the following is not a defined maturity level?
the software capability maturity model, which of the following is not a defined maturity level?
which of the following represents the table rows?
In a relational database, which of the following represents the table rows?
When work product satisfies real-world requirements and concepts, this is known as:
When work product satisfies real-world requirements and concepts, this is known as:
Which type of virus can change its own code, making it harder to detect with antivirus software?
Which type of virus can change its own code, making it harder to detect with antivirus software?
Which of the following are correct characteristics of Object Linking and Embedding Databases?
Which of the following are correct characteristics of Object Linking and Embedding Databases?’
i.It’s a replacement for ODBC, extending its feature set to support a wider variety of nonrelational databases, such as object databases and spreadsheets that do not necessarily implement SQL.
ii. A set of COM-based interfaces provide applications with uniform access to datastored in diverse data sources.
iii. Because it is COM-based, OLE DB is limited to use by Microsoft Windows-based client tools.
iv. It allows different applications to access different types and sources of data.
A high-level programming language:
A high-level programming language:
Which is of the following is the best choice?
A system file that has been patched several times becomes infected with a virus,but the antivirus software warns that disinfecting the file may damage it. Which is of the following is the best choice?