A ____ is a computer program that infects a host computer and then spreads.
scorpion
Trojan horse
virtual program
virus
virus
Computer Science & Information Technology
You might also like to view...
The ______________ window allows you to browse solution files.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
The two basic types of validation rules are ________
A) field properties and field validation rules B) data validation rule and validation text C) data accuracy rules and record validation rules D) field validation rules and record validation rules
Computer Science & Information Technology
The NOT operator is a binary operator.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Adric wants to store files on optical media. Which storage media would be the cheapest and have a maximum capacity of 700MB?
A) DVD-RW B) CD-R C) Blu-Ray D) IEEE 1496
Computer Science & Information Technology