When Shelly downloaded an arcade game from an unknown Internet Web site, an unauthorized connection unknown to Shelly was established with her computer. The arcade game is most likely to be ________

A) spyware
B) a worm
C) adware
D) a Trojan horse
E) encryption


D

Business

You might also like to view...

The final step in the career management process is

A. goal setting. B. reality check. C. action planning and follow-up. D. feedback. E. self-assessment.

Business

Discuss why micro-rests are important when creating a document for a mobile device

What will be an ideal response?

Business

What are the major exposures in the general ledger/financial reporting system?

Business

Briefly identify some disadvantages a company with a large and diverse business portfolio may experience

What will be an ideal response?

Business