Options: (A)a prepared application that takes advantage of a known weakness. (B) a tool used to quickly check computers on a network for known weaknesses. (C) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. (D) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.
Options: when the bowler bowls out three batsman with three successive balls, when the batsman intercepts the ball with his leg or any part of his body between the wicket, when the batsman, while hitting the ball, strikes his own wicket with his bat or body and is declared out, None of the above
Options: (A)The tasks that reacts to events that take place in out side world. (B) The tasks that do not reacts to the outside world events. (C) The tasks are independent of the time when it occurs. (D) None of these. 7