Question

Principals of Computer Security Small bits of text that are stored on a user's machine and...

Principals of Computer Security

Small bits of text that are stored on a user's machine and sent to specific websites when the user visits are called:

a.

temp files

b.

documents

c.

web history

d.

cookies

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Answer : d. Cookies

( cookies are used to track a user's activity on a website. It can be accessed by both web server as well as client systems. It stores data of the user who accessed the website.)

Add a comment
Know the answer?
Add Answer to:
Principals of Computer Security Small bits of text that are stored on a user's machine and...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Subject Javascript: Before HTML5, websites could store only small amounts of text-based information on a user's...

    Subject Javascript: Before HTML5, websites could store only small amounts of text-based information on a user's computer using cookies. What are the advantages of using cookies and why are they so important as it pertains to web applications?

  • Principals of Computer Security A piece of malicious code that sits dormant for a period of...

    Principals of Computer Security A piece of malicious code that sits dormant for a period of time until some event is called a _____________. a. trojan b. logic bomb c. spyware d. rootkit

  • A security administrator is analyzing a user report in which the computer exhibits odd network-related outages....

    A security administrator is analyzing a user report in which the computer exhibits odd network-related outages. The administrator, however, does not see any suspicious processes running. A prior technician's note indicate the machine has been remediated twice, but the system still exhibits odd behavior. Files were deleted from the system recently. Which of the following is the most likely cause of this behavior? A. Crypto-malware B. Rootbit C. Logic bomb D. Session hijacking

  • 26. The is a group of bits that tells the computer to perform a specific operation...

    26. The is a group of bits that tells the computer to perform a specific operation A). program counter B). Opcode C). register D). microoperation 27. A condition called occurs in unsigned binary representation of a number when the result of an arithmetic operation is outside the range of allowable precision for the given number of bits. A). underflow B). 2's complement C). overflow D) bitwise complement 28. An iteration of the fetch-decode-execute cycle includes which of the following events?...

  • ER Modeling: Assignment In order to receive credit for this assignment, you must draw your ER...

    ER Modeling: Assignment In order to receive credit for this assignment, you must draw your ER model using a compute program and then turn in on the blackboard. Your ER model should include all of the necessary entity sets, relationships and keys, as well a weak entities and superclass/subclass relationships, if needed. A company decides to implement a software to monitor its employees' web surfing, and stores history of each employee's surfing in a database, as well as all of...

  • help please as soon as possible The internet is a global .... O A. Administrator O...

    help please as soon as possible The internet is a global .... O A. Administrator O B. Server O C. WAN. OD. LAN. This type of visual display lets you use a mouse to interact with the workspace on the computer screen. O A. Desktop B. BIOS OC. Graphical user interface OD. Operating system A Microphone is a type of this: A. Output device B. No correct answer O c. Input device D. Input Output device _let you work with...

  • Computer Security Help 21) The process of keeping a backup copy of each file being worked...

    Computer Security Help 21) The process of keeping a backup copy of each file being worked on by backing it up every few minutes is called ________. A) file backup B) file/folder backup C) image backup D) shadowing 22) Attacks other than application level attacks usually fail to get through SPI firewalls. True False Save 23) Normally, there is no limit on how long shadowing may maintain backed up files. True False 24) Java applets are large Java programs. Question...

  • TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for...

    TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program. 2. Without suitable synchronization of accesses it is possible that values may be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values. 3. The biggest change of the nature in Windows XP SP2 was to change all anonymous remote procedure call (RPC)...

  • 6. With respect to database systems, which of the following statement(s) is (are) true? a. The...

    6. With respect to database systems, which of the following statement(s) is (are) true? a. The physical view of data is how people conceptually organize and understand the relationships among data items. b. The DML builds the data dictionary, creates the database, describes logical views for each user, and specifies security constraints. c. A record layout shows the items stored in a file, including the type of data stored and both the order and length of the data fields. d....

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT