When a Trojan horse is opened it spreads _____ in the computer system

a. viruses
b. worms
c. logic bombs
d. spam


a

Criminal Justice

You might also like to view...

Briefly describe the main components of the four-step S.A.R.A. process

What will be an ideal response?

Criminal Justice

An inverse association would be depicted as:

a. -.42. b. .76. c. .21. d. .33.

Criminal Justice

Victim proneness is the product of personal characteristics, social situations, physical locations, and relationships to offenders

a. True b. False

Criminal Justice

Field notes should be taken after an officer has left the scene of the event or incident

a. True b. False

Criminal Justice