A computer program that attaches itself to another computer program and attempts to spread itself to other computers when files are exchanged is called a ________

A) bug
B) spam
C) worm
D) virus


D

Computer Science & Information Technology

You might also like to view...

Discuss the implementation issues associated with replication.

What will be an ideal response?

Computer Science & Information Technology

Match the following comparison operators with their symbol:

I. Equal II. Greater than III. Less than IV. Greater than or equal to V. Less than or equal to A. > B. < C. = D. <= E. >=

Computer Science & Information Technology

________ are responsible for developing and writing programs

Fill in the blank(s) with correct word

Computer Science & Information Technology

The ____________________ blend mode creates semitransparent shadow effects and multiplies the value of the base color by the blend color.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology