What type of malicious program cannot stand on its own and can replicate itself through an executable program attached to an e-mail?

A. shell
B. virus
C. keylogger
D. rootkit


Answer: B

Computer Science & Information Technology

You might also like to view...

When the applet viewer opens an HTML document with more than one applet tag:

A) it terminates immediately B) it displays the first applet, and then terminates C) it displays each applet in a separate window D) it displays each applet in order in the same window

Computer Science & Information Technology

What is the number of iterations in the following loop:

``` int count = 5; while (count < n) { count = count + 3; } ``` A. n - 3 B. n - 5 C. (n - 5) / 3 D. n / 3 - 1 E. the ceiling of (n - 5) / 3

Computer Science & Information Technology

When a subclass constructor calls its superclass constructor, what happens if the superclass’s constructor does not assign a value to an instance variable?

a. A syntax error occurs. b. A compile-time error occurs. c. A run-time error occurs. d. The program compiles and runs because the instance variables are initialized to their default values.

Computer Science & Information Technology

What is wrong with the following program?

What will be an ideal response?

Computer Science & Information Technology