?____ is a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner.

Fill in the blank(s) with the appropriate word(s).


Virus

Computer Science & Information Technology

You might also like to view...

Which of the following statements best applies to the term user-defined events?

(A) User-defined events represent specific instances of a user-defined type. (B) User-defined events are used to communicate changes of properties, errors, and the progress of lengthy operations. (C) User-defined events are predefined objects with physical manifestations. (D) User-defined events are populated with objects that hold data, have properties, respond to methods, and raise events.

Computer Science & Information Technology

The ___________ method of class BufferedReader is used to close a file that has been opened for reading.

a) flush b) closeBufferedReader c) closeFile d) close

Computer Science & Information Technology

Which view do you use to modify lines or rectangles?

A) Form or Report view B) Design view C) Datasheet view D) Layout view

Computer Science & Information Technology

Which of the following sequence of events best describes an online intrusion?

A. Malware enters the device, and then opens a backdoor, which opens a communications link on the device that a hacker can exploit. B. A backdoor is opened on the device locally, which allows malware to be loaded onto the device by a hacker. C. A USB drive containing a trojan is inserted into a device, which opens a backdoor allowing a hacker access to the device. D. None of the above.

Computer Science & Information Technology