Exercice n°2 sur l'informatique en anglais Question 1/10 …. used to be a negative word; now the term is synonymous with competence and dedication. Alpha Geek Kludge HeaderQuestion 2/10 In programming, … are often used so that threads of a program can share a resource. links leverages locks limitsQuestion 3/10 If used illicitly, spyware programs, browser hijackers and keyloggers, are all examples of ... crimeware spam trojans kitsQuestion 4/10 Ice, …and liquid are related terms describing 3 approaches to controlling content placement on a Web page. leet jello jump matrixQuestion 5/10 A person who tinkers with hardware and programming to a point approaching obsession is more commonly known as a … tweaker nerd twitter freakQuestion 6/10 A … is often used as an alternative solution to a problem until the problem is fixed. scooter war dialer white space workaroundQuestion 7/10 Users can verify a particular IP address using a ... twin ping penguin mobQuestion 8/10 Online backup is also known as … backup. event hot cloud chargeQuestion 9/10 … is a common type of software piracy in which a legally licensed software program is installed or copied in violation of its licensing agreement. Desking Softlifting Beamforming WeavingQuestion 10/10 User-generated … include keystrokes and mouse clicks. actions faults events attacksSuivant