Software that acts without a user's knowledge and deliberately alters the computer's operations is called _____.?
A. ?malware
B. a ?virus
C. ?a worm
D. ?spyware
Answer: A
You might also like to view...
An array is a very good data structure for storing a sequence whose size does not change.
Answer the following statement true (T) or false (F)
How many loops are necessary to access the contents of a one-dimensional array efficiently?
A. 0 B. 1 C. 2 D. more than 2
A Company has recently identified critical systems that support business operations. Which of the following will once defined, be the requirement for restoration of these systems within a certain period of time?
A. Mean Time Between Failure B. Mean Time to Restore C. Recovery Point Objective D. Recovery Time Objective
Which of the following C statements reads a character, an integer, and a real in that order?
A. %c, %d, %f B. %c, %d, %r C. %c%d%r D. %c %d %f E. %cdr