A Trojan horse might allow a hacker to _____.
A. see the contents of your screen
B. capture your login keystrokes
C. control your Webcam
D. all of the above
Answer: D
Computer Science & Information Technology
You might also like to view...
The assignment operator ________ assigns the value of the expression on its right to the variable on its left.
a. <- b. -> c. = d. #
Computer Science & Information Technology
Using the mouse to move or copy cells is called _____.
A. drop and drag B. drag and drop C. drag and copy D. drag and paste
Computer Science & Information Technology
The most common format for storing color images is the ____ encoding scheme.
a. variable-length b. CMYK c. TIF d. RGB d. RGB
Computer Science & Information Technology
You can share information with users on the Web using a _____.
A. frame B. blog C. cell D. function
Computer Science & Information Technology