The term ________ encompasses several types of malicious computer programs that are created to harm computer systems and their users.
A. malware
B. phishing
C. hacker
D. bugs
Answer: A
You might also like to view...
A(n) ________ uses computer networks and communications technology to bring people together to work on projects.
A) virtual enterprise B) open system C) enterprise system D) official subculture
Which of the following is NOT a method supported by Solver?
A) Evolutionary B) GRG Nonlinear C) Duplex D) Simplex LP
Which of the following fire detection systems operates using a photoelectric device to detect variations in light?
A. Smoke-activated B. Heat-activated C. Flame-actuated D. Wet pipe
____________________ objects are not composed of any objects and are usually entities such as theĀ users, peripherals, servers, printers, queues, and other network resources.?
Fill in the blank(s) with the appropriate word(s).