Software with harmful or malicious intent to disrupt the business operation of a PC or network or to steal information or money is called ____.
A. vaporware
B. phishing
C. shareware
D. malware
Answer: D
You might also like to view...
What type of analysis method is difficult to apply due to the nature of ICT projects, and must be utilized with other risk analysis methods for full effect?
A. Quantitative analysis B. Qualitative analysis C. Cumulative analysis D. Baseline analysis
A(n) ____ operation involves the comparison of values and the subsequent use of the outcome to decide what to do next.
A. iterative B. conditional C. sequential D. transformer
In the problem-solving process, you should always devise a solution to the problem you are facing prior to determining the scope of the problem.
Answer the following statement true (T) or false (F)
Which general-purpose tool can measure characteristics of electricity in a variety of device?
A. loopback plug B. POST card C. Multimeter D. Cable tester