A _____ is a software program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media to which it has access.

A. ?firewall
B. ?proxy
C. ?virus
D. ?digital signature


Answer: C

Computer Science & Information Technology

You might also like to view...

An IsEmpty method you write to test whether a linked list is empty is called a __________ method.

a) predefined b) predicate c) preemption d) preorder

Computer Science & Information Technology

Pages of the body of the report are numbered at the top right.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Explain how an on-line UPS works and why their advantages when compared to off-line UPS units.

What will be an ideal response?

Computer Science & Information Technology

Sharon is troubleshooting a computer and wants to test the hard drive in another computer. Sharon removes the hard drive and notices that it does not have a SATA power connection. The connector for power is white and has four pins instead.   What type of connector will Sharon need to test the hard drive in the computer she is using?

A. eSATA connector B. BNC connector C. Molex connector D. P4 power connector

Computer Science & Information Technology