Which type of virus can change its own code, making it harder to detect with antivirus software?
Which type of virus can change its own code, making it harder to detect with antivirus software?
Which of the following are correct characteristics of Object Linking and Embedding Databases?
Which of the following are correct characteristics of Object Linking and Embedding Databases?’
i.It’s a replacement for ODBC, extending its feature set to support a wider variety of nonrelational databases, such as object databases and spreadsheets that do not necessarily implement SQL.
ii. A set of COM-based interfaces provide applications with uniform access to datastored in diverse data sources.
iii. Because it is COM-based, OLE DB is limited to use by Microsoft Windows-based client tools.
iv. It allows different applications to access different types and sources of data.
A high-level programming language:
A high-level programming language:
Which is of the following is the best choice?
A system file that has been patched several times becomes infected with a virus,but the antivirus software warns that disinfecting the file may damage it. Which is of the following is the best choice?
which of the following circumstances is computer application security most effective and economical?
which of the following circumstances is computer application security most effective and economical?
which one changes characteristics as it spreads?
Of the following virus types, which one changes characteristics as it spreads?
Which of the following should the necessary product implement?
John is reviewing database products. He needs a product that can manipulate astandard set of data for his company’s business logic needs. Which of the following should the necessary product implement?
which of the following represents a relation?
In a relational database, which of the following represents a relation?
When should the security department become involved in the applications development process?
When should the security department become involved in the applications development process?
Which of the following best describes TCSEC?
Which of the following best describes TCSEC?