A _____ is a type of Trojan horse that executes when specific conditions occur.
a. virus
b. worm
c. logic bomb
d. rootkit
Answer: c. logic bomb
Computer Science & Information Technology
You might also like to view...
A collection is an object. A collection is also an abstraction. Explain how these two sentences can both be true.
What will be an ideal response?
Computer Science & Information Technology
A(n) ____ symbol is a static object usually used to create an animation spanning across frames in the Timeline.
A. movie clip B. graphic C. icon D. button
Computer Science & Information Technology
A tabbed list can be converted to a Table by using the ________ button
A) Table B) Format C) List D) Edit
Computer Science & Information Technology
What is the Common Internet File System (CIFS)?
What will be an ideal response?
Computer Science & Information Technology