could be included in a compiler
pose a difficult problem because, to detect them
both (a) and (b)
none of these
the system can check for suspicious patterns of activity in an attempt to detect a security violation
a time sharing a system that counts the number of incorrect passwords given
A code segment that misuses its file is called Trojan horse
good for file accessing
preventation
practice of safe computing
purchasing unopened software from vendors
avoiding free or pirated copies from public sources
trap doors
Trojan Horse
are usually spread by users downloading viral programs from public bulletin boards or exchanging floppy disks containing an infection
are beneficial for program
the password is different in each instance
the password is same in each instance
another form of computer attack is virus
virus are designed to spread into other programs and can wreak havoc in a system
it modifying or destroying files and causing system crashes and program malfunctions
all of these
user passwords
user log in
hardware device
grappling hook program
main program
secondary program
primary storage