A Trojan horse might allow a hacker to _____.

A. see the contents of your screen
B. capture your login keystrokes
C. control your Webcam
D. all of the above


Answer: D

Computer Science & Information Technology

You might also like to view...

The assignment operator ________ assigns the value of the expression on its right to the variable on its left.

a. <- b. -> c. = d. #

Computer Science & Information Technology

Using the mouse to move or copy cells is called _____.

A. drop and drag B. drag and drop C. drag and copy D. drag and paste

Computer Science & Information Technology

The most common format for storing color images is the ____ encoding scheme.

a. variable-length b. CMYK c. TIF d. RGB d. RGB

Computer Science & Information Technology

You can share information with users on the Web using a _____. 

A. frame B. blog C. cell D. function

Computer Science & Information Technology