A ________ is attached to program files, like an Excel spreadsheet, and spread to other programs or files on your hard disk when the file is opened.

a. logic bomb
b. virus
c. worm
d. time bomb


Ans: b. virus

Computer Science & Information Technology

You might also like to view...

Asymptotic running time refers to:

A. the running time behavior of an algorithm as n approaches infinity B. how the running time of an algorithm gets closer and closer to a maximum running time, but never quite gets there C. timing an algorithm by use of the asymptotic method D. how the number of elements changes as n approaches infinity

Computer Science & Information Technology

The ____ data type allows an element to contain any text string.

A. pcdata B. text C. alpha D. string

Computer Science & Information Technology

You can change the transparency of a picture used as a slide's background in the ____ dialog.

A. Adjust Transparency B. Format Picture C. Picture Transparency D. Format Background

Computer Science & Information Technology

What is the best way to move the IPAM database to an SQL server?

A. Reinstall IPAM and select the Preserve data option B. Run the Move-IpamDatabase cmdlet C. From the SQL Server, run the Import-WID cmdlet D. From the IPAM console select Export to SQL

Computer Science & Information Technology