A _____ is a software program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media to which it has access.
A. ?firewall
B. ?proxy
C. ?virus
D. ?digital signature
Answer: C
You might also like to view...
An IsEmpty method you write to test whether a linked list is empty is called a __________ method.
a) predefined b) predicate c) preemption d) preorder
Pages of the body of the report are numbered at the top right.
Answer the following statement true (T) or false (F)
Explain how an on-line UPS works and why their advantages when compared to off-line UPS units.
What will be an ideal response?
Sharon is troubleshooting a computer and wants to test the hard drive in another computer. Sharon removes the hard drive and notices that it does not have a SATA power connection. The connector for power is white and has four pins instead. What type of connector will Sharon need to test the hard drive in the computer she is using?
A. eSATA connector B. BNC connector C. Molex connector D. P4 power connector