Match the following terms to their meanings:

I. Program that intentionally harms your computer A. spyware
II. Computer that has malware installed B. virus definition
III. Software that collects personal information C. Trojan horse
IV. A program that disguises itself as a legitimate program D. malware
V. Information needed by the antivirus program to find E. infected
and remove a virus


D, E, A, C, B

Computer Science & Information Technology

You might also like to view...

Which of the following DRP tests is typically done as the first step toward a more comprehensive testing?

A. Simulations B. Walk-throughs C. Full interruption D. Parallel testing E. Checklists

Computer Science & Information Technology

Describe how the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) differ from each other, and provide examples of where each might be used.

What will be an ideal response?

Computer Science & Information Technology

A hard disk can permanently hold data and programs.

a. true b. false

Computer Science & Information Technology

Wide area networks share a few characteristics with local area networks.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology