A virus __________ usually arrives as an email message that contains warnings about a fake virus.

A. payload
B. signature
C. hoax
D. dropper


Answer: C

Computer Science & Information Technology

You might also like to view...

To catch an exception, the code that might throw the exception must be enclosed in a ________.

a. throws block. b. catch block. c. try block. d. finally block.

Computer Science & Information Technology

Process specifications are sometimes called ________, because they are a small portion of the total project specifications.

A) designs B) data flows C) information nodes D) mini specs

Computer Science & Information Technology

Memory that is older and has a row of legs down each side of the chip is known as a _______ chip

A) VCM B) SIMM C) DIP D) So-DIMM

Computer Science & Information Technology

IBM's DB2 program contains a hybrid XML/relational database server.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology