The most prevalent types of malicious code include all of the following, EXCEPT _____.

A. spam
B. viruses
C. Trojan horses
D. computer worms


Answer: A

Computer Science & Information Technology

You might also like to view...

When a new hard disk is added to a computer it is initially configured as a dynamic disk.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

In which switch mode is a data packet forwarded to the destination as soon as the MAC address has been read?

a. Store-and-forward b. Adaptive fast-forward c. Cut-through d. Fast-forward

Computer Science & Information Technology

The ____ statement in C++ is used to implement a decision structure in its simplest form—choosing between two alternatives.

a. for b. if-else c. switch-case d. while

Computer Science & Information Technology

The firewall's responsibility is to make sure that no traffic gets through.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology