Which of the following is a program advertised as performing one activity but actually does something else?
A. worm
B. rootkit
C. Trojan
D. virus
Answer: C
You might also like to view...
According to the text, is it possible to develop Internet applications without understanding the architecture of the Internet and the technologies? Support your answer.
What will be an ideal response?
Can you change your default login shell?
What will be an ideal response?
Identify the letter of the choice that best matches the phrase or definition.
A. A situation where the user is interacting with a button, such as clicking a button with the mouse and then releasing it B. A symbol containing a Timeline with only four frames C. A sound synchronized with the Timeline D. Does not play until the entire sound has downloaded E. Sounds free of this have no additional usage fees when distributed with your projects F. Option to specify a set number of times you want a sound to play G. Object to which the event will happen H. Steps performed when the event occurs I. A sound setting under which the first instance of the sound will be stopped before a new instance starts J. Is the button's clickable area but does not change the button's appearance K. Part of the rendering process L. A graphical representation of a sound
In Access, the feature that dictates the fields that become active when you press the Tab key is ________
A) Field order B) Tab order C) Field sequence D) Tab sequence