_______________ is software that is downloaded, often without your knowledge, and whose purpose is to damage your computer files and steal your data.

Fill in the blank(s) with the appropriate word(s).


malware

Computer Science & Information Technology

You might also like to view...

A multi-way if-else statement

a. allows you to choose one course of action. b. always executes the else statement. c. allows you to choose among alternative courses of action. d. executes all Boolean conditions that evaluate to true.

Computer Science & Information Technology

Which of the following are not valid Java identifiers? Why?

a. Factorial b. anExtremelyLongIdentifierIfYouAskMe c. 2ndLevel d. level2 e. MAX_SIZE f. highest$ g. hook&ladder

Computer Science & Information Technology

Use the INPUT statement to accomplish the task:

Write a sample data list for the statement: INPUT vehicle_model.

Computer Science & Information Technology

The _____ pseudo-class is to be used for a situation in which a user has moved the mouse pointer over a hypertext link prior to clicking the link.?

A. ?active B. ?root C. ?link D. ?hover

Computer Science & Information Technology