Software with harmful or malicious intent to disrupt the business operation of a PC or network or to steal information or money is called ____.

A. vaporware
B. phishing
C. shareware
D. malware


Answer: D

Computer Science & Information Technology

You might also like to view...

What type of analysis method is difficult to apply due to the nature of ICT projects, and must be utilized with other risk analysis methods for full effect?

A. Quantitative analysis B. Qualitative analysis C. Cumulative analysis D. Baseline analysis

Computer Science & Information Technology

A(n) ____ operation involves the comparison of values and the subsequent use of the outcome to decide what to do next.

A. iterative B. conditional C. sequential D. transformer

Computer Science & Information Technology

In the problem-solving process, you should always devise a solution to the problem you are facing prior to determining the scope of the problem.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which general-purpose tool can measure characteristics of electricity in a variety of device?

A. loopback plug B. POST card C. Multimeter D. Cable tester

Computer Science & Information Technology