Which of the following is an application that appears to be benign but actually performs a malicious activity?

A) Virus
B) Spyware
C) Trojan horse
D) Worm


C) Trojan horse

Computer Science & Information Technology

You might also like to view...

A programming statement similar to first_name = “Fred”; should never be read as first_name equals Fred in programming. Explain two correct ways to state the above statement.

What will be an ideal response?

Computer Science & Information Technology

Explain the push, pop and top operations of a stack.

What will be an ideal response?

Computer Science & Information Technology

You need to write a script that will run on both the Mac OS and Windows. Which scripting language should you use?

What will be an ideal response?

Computer Science & Information Technology

The ________ number format multiplies the number in the cell by 100

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology