Which of the following is a program that appears to be something useful or desirable but does something malicious in the background?

A) A bot
B) A Trojan horse
C) A worm
D) A zombie


B

Computer Science & Information Technology

You might also like to view...

Consider the following schema:

Employee (ID,Name,Address)
Supplier (ID,Name)
PurchaseOrder (OrderID,EmpIssuerID,SupplierID,Date)
PurchaseItem (ItemID,OrderID,ItemName,ItemCost)
The first two schemas are self-explanatory. Each tuple in PurchaseOrder describes a purchase order issued by a particular employee to a particular supplier. The last relation, PurchaseItem, describes each ordered item and its relationship to the corresponding order. Write the following queries using the SQL language: (a) Names of employees who have made a purchase order that contains an item costing more than $150. (b) For each supplier, list the name and the total cost of all items ever ordered from this supplier. (c) Number of orders such that the total cost of items in each of those orders is over $200. (d) Names of employees who have issued a purchase order to every supplier.

Computer Science & Information Technology

The author-date citation has fields for all these EXCEPT:

A) author's first name. B) author's last name. C) publication year. D) page numbers (if available).

Computer Science & Information Technology

Imported data must be free of duplicate data or it will result in an error

Indicate whether the statement is true or false

Computer Science & Information Technology

Where possible, avoid compressing files because compressed files slow down file transmission.

a. true b. false

Computer Science & Information Technology