The most prevalent types of malicious code include all of the following, EXCEPT _____.
A. spam
B. viruses
C. Trojan horses
D. computer worms
Answer: A
Computer Science & Information Technology
You might also like to view...
When a new hard disk is added to a computer it is initially configured as a dynamic disk.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
In which switch mode is a data packet forwarded to the destination as soon as the MAC address has been read?
a. Store-and-forward b. Adaptive fast-forward c. Cut-through d. Fast-forward
Computer Science & Information Technology
The ____ statement in C++ is used to implement a decision structure in its simplest form—choosing between two alternatives.
a. for b. if-else c. switch-case d. while
Computer Science & Information Technology
The firewall's responsibility is to make sure that no traffic gets through.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology