A ________ allows someone to gain control over a computer while hiding the fact that the computer has been compromised.
a. virus
b. spyware
c. rootkit
d. worm
c. rootkit
Computer Science & Information Technology
You might also like to view...
A ____ error occurs when an instruction does not follow the grammar rules of the programming language.
A. syntax B. runtime C. logic D. processing
Computer Science & Information Technology
How many IP datagram, ICMP messages, UDP datagram, and TCP segments has PC1 transmitted and received since it was last rebooted?
What will be an ideal response?
Computer Science & Information Technology
The maximum range for Bluetooth is approximately ________
A) 250 feet B) 250 meters C) 30 feet D) 30 meters
Computer Science & Information Technology
Line 5 – What numbers will be generated?
A. 5 through 1000 B. 0 through 1004 C. 5 through 1004 D. compiler error – there should be a number in the parentheses for rand()
Computer Science & Information Technology