A ____ is a computer program that infects a host computer and then spreads.

scorpion
Trojan horse
virtual program
virus


virus

Computer Science & Information Technology

You might also like to view...

The ______________ window allows you to browse solution files.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The two basic types of validation rules are ________

A) field properties and field validation rules B) data validation rule and validation text C) data accuracy rules and record validation rules D) field validation rules and record validation rules

Computer Science & Information Technology

The NOT operator is a binary operator.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Adric wants to store files on optical media. Which storage media would be the cheapest and have a maximum capacity of 700MB?

A) DVD-RW B) CD-R C) Blu-Ray D) IEEE 1496

Computer Science & Information Technology