The Task Manager can be very valuable from a security perspective as it can show harmful programs running referred to as:

A) Freeware B) Shareware C) Malware D) Scripts


C

Computer Science & Information Technology

You might also like to view...

To simplify keeping track of the files, MS-DOS allows the user to create special files called __________.

a. index files b. root directories c. The premise of this question is false. d. subdirectories

Computer Science & Information Technology

When defining a class member function, the compiler needs to know which class owns a function. Which operator is used to assign “ownership” to a class?

A. right arrow -> B. scope :: C. indirection * D. address &

Computer Science & Information Technology

Changing the chart type for one or more data series is an example of changing a chart parameter

Indicate whether the statement is true or false.

Computer Science & Information Technology

The object that retrieves specific data and then displays only the data that you specify is a __________.

The object that retrieves specific data and then displays only the data that you specify is a __________. a. form b. query c. report d. table

Computer Science & Information Technology