Software that acts without a user's knowledge and deliberately alters the computer's operations is called _____.?

A. ?malware
B. a ?virus
C. ?a worm
D. ?spyware


Answer: A

Computer Science & Information Technology

You might also like to view...

An array is a very good data structure for storing a sequence whose size does not change.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

How many loops are necessary to access the contents of a one-dimensional array efficiently?

A. 0 B. 1 C. 2 D. more than 2

Computer Science & Information Technology

A Company has recently identified critical systems that support business operations. Which of the following will once defined, be the requirement for restoration of these systems within a certain period of time?

A. Mean Time Between Failure B. Mean Time to Restore C. Recovery Point Objective D. Recovery Time Objective

Computer Science & Information Technology

Which of the following C statements reads a character, an integer, and a real in that order?

A. %c, %d, %f B. %c, %d, %r C. %c%d%r D. %c %d %f E. %cdr

Computer Science & Information Technology