What type of computer code is typically added to a legitimate program but lies dormant until a specific logical event triggers it?

A. script
B. logic bomb
C. macro virus
D. metamorphic virus


Answer: B

Computer Science & Information Technology

You might also like to view...

?Without styles applied to a table, all the columns appear to run together.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The Kerberos server issues a special token or ticket to its authenticated users and it uses this ticket to validate user access to a resource or a service. This process is called which of the following?

a. Pre-authorization b. Prior authorization c. Single sign-on d. Multi-layer sign-on

Computer Science & Information Technology

Match the following results with the proper comparison operators:

I. Does not equal 5000 II. Is less than 5000 III. Is less than or equal to 5000 IV. Is greater than 5000 V. Is greater than or equal to 5000 A. <5000 B. <=5000 C. >=5000 D. >5000 E. <>5000

Computer Science & Information Technology

Pointers to functions are possible because function ____ are themselves pointer constants.

a. classes b. methods c. names d. values

Computer Science & Information Technology