A computer program that attaches itself to another computer program and attempts to spread itself to other computers when files are exchanged is called a ________
A) bug
B) spam
C) worm
D) virus
D
Computer Science & Information Technology
You might also like to view...
Discuss the implementation issues associated with replication.
What will be an ideal response?
Computer Science & Information Technology
Match the following comparison operators with their symbol:
I. Equal II. Greater than III. Less than IV. Greater than or equal to V. Less than or equal to A. > B. < C. = D. <= E. >=
Computer Science & Information Technology
________ are responsible for developing and writing programs
Fill in the blank(s) with correct word
Computer Science & Information Technology
The ____________________ blend mode creates semitransparent shadow effects and multiplies the value of the base color by the blend color.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology