A "____" is a type of stand-alone software attack that does not replicate by itself.

A. BIOS virus
B. worm
C. Trojan horse
D. virus


Answer: C

Computer Science & Information Technology

You might also like to view...

Explain how Office programs can save you the time it takes to do an Internet search or to skim through your reference books when you need to know some details about a person, place, or historical event.

What will be an ideal response?

Computer Science & Information Technology

Case-Based Critical Thinking Questions Case 10-1You are planning to open a new restaurant and need to determine how many dinners need to be sold to stay above the break-even point. You will investigate Cost Volume Profit (CVP), also known as break-even analysis. Another tool to help analyze several what-if analyses is data tables in Excel. Using a one-variable table, you can specify _______ input cell(s) and any number of result cells.

A. many B. one C. two D. three

Computer Science & Information Technology

Describe a gigabit interface converter (GBIC).

What will be an ideal response?

Computer Science & Information Technology

_______________ refers to the spacing between two characters.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology