All of the following are unwanted software a hacker could install on your computer, EXCEPT ________

A) keystroke loggers
B) ghosts
C) Trojan horses
D) rootkits


B

Computer Science & Information Technology

You might also like to view...

Outside of a C++ program, a file is identified by its ________. Inside a C++ program, a file is accessed through a ________.

A) file number, file name B) file name, file number C) name, address D) name, file stream object E) None of the above

Computer Science & Information Technology

For many organizations, proxy servers have been superseded by a newer technology known as which of the following?

A) TCP B) NAT C) FTP D) DMZ

Computer Science & Information Technology

All of the following could produce a #NAME? error with the exception of which one?

A) Misspelled word B) Invalid function name C) Invalid arguments in a function D) Invalid range name

Computer Science & Information Technology

READ is the __________ implementation of "input."

A. Fortran B. Cobol C. C++ D. C#

Computer Science & Information Technology