A ____ is a malicious program that masquerades as something else—usually as some type of application program.
A. Trojan horse
B. computer worm
C. computer insect
D. computer bug
Answer: A
Computer Science & Information Technology
You might also like to view...
Use a figure to explain the packets that were exchanged by the DHCP client and the DHCP server as part of the process of acquiring an IP address.
What will be an ideal response?
Computer Science & Information Technology
Define what is meant by scaling.
What will be an ideal response?
Computer Science & Information Technology
The Print ________ defines what cells will print.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Each programming language has a set of rules, called the program code of the language.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology