When Shelly downloaded an arcade game from an unknown Internet Web site, an unauthorized connection unknown to Shelly was established with her computer. The arcade game is most likely to be ________
A) spyware
B) a worm
C) adware
D) a Trojan horse
E) encryption
D
Business
You might also like to view...
The final step in the career management process is
A. goal setting. B. reality check. C. action planning and follow-up. D. feedback. E. self-assessment.
Business
Discuss why micro-rests are important when creating a document for a mobile device
What will be an ideal response?
Business
What are the major exposures in the general ledger/financial reporting system?
Business
Briefly identify some disadvantages a company with a large and diverse business portfolio may experience
What will be an ideal response?
Business