A virus __________ usually arrives as an email message that contains warnings about a fake virus.
A. payload
B. signature
C. hoax
D. dropper
Answer: C
Computer Science & Information Technology
You might also like to view...
To catch an exception, the code that might throw the exception must be enclosed in a ________.
a. throws block. b. catch block. c. try block. d. finally block.
Computer Science & Information Technology
Process specifications are sometimes called ________, because they are a small portion of the total project specifications.
A) designs B) data flows C) information nodes D) mini specs
Computer Science & Information Technology
Memory that is older and has a row of legs down each side of the chip is known as a _______ chip
A) VCM B) SIMM C) DIP D) So-DIMM
Computer Science & Information Technology
IBM's DB2 program contains a hybrid XML/relational database server.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology