A ____ is a malicious program that masquerades as something else—usually as some type of application program.

A. Trojan horse
B. computer worm
C. computer insect
D. computer bug


Answer: A

Computer Science & Information Technology

You might also like to view...

Use a figure to explain the packets that were exchanged by the DHCP client and the DHCP server as part of the process of acquiring an IP address.

What will be an ideal response?

Computer Science & Information Technology

Define what is meant by scaling.

What will be an ideal response?

Computer Science & Information Technology

The Print ________ defines what cells will print.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Each programming language has a set of rules, called the program code of the language.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology