A _____ is a set of programs that enables its user to gain administrator level access to a computer or network.

a. virus
b. Trojan horse
c. rootkit
d. worm


Ans: c. rootkit

Computer Science & Information Technology

You might also like to view...

Suppose class Child is derived from class Parent that was in turn derived from class GrandParent. This question concerns order of calls to constructors and destructors for these three classes. Declare an object of class Child. We know that Child, Parent and GrandParent constructors are called. In what order are these constructors are called? When the time comes to destroy the class Child object, we know that Child, Parent and GrandParent destructors are called. In what order are these destructor called?

What will be an ideal response?

Computer Science & Information Technology

To share an element from another movie, display the library that contains the element and then ____.

A. drag it to the Library panel B. copy and paste it C. drag it to the Stage D. any of the above

Computer Science & Information Technology

An entire image can be selected by a command found on the Image menu.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The range of valid index values for an array nameruns from 0...name.length.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology