A _____ is a type of Trojan horse that executes when specific conditions occur.

a. virus
b. worm
c. logic bomb
d. rootkit


Answer: c. logic bomb

Computer Science & Information Technology

You might also like to view...

A collection is an object. A collection is also an abstraction. Explain how these two sentences can both be true.

What will be an ideal response?

Computer Science & Information Technology

A(n) ____ symbol is a static object usually used to create an animation spanning across frames in the Timeline.

A. movie clip B. graphic C. icon D. button

Computer Science & Information Technology

A tabbed list can be converted to a Table by using the ________ button

A) Table B) Format C) List D) Edit

Computer Science & Information Technology

What is the Common Internet File System (CIFS)?

What will be an ideal response?

Computer Science & Information Technology