A program that replicates itself and clogs computers and networks.
A. denial-of-service attack
B. virus
C. worm
D. Trojan horse
Answer: C
You might also like to view...
Name and describe the three functional areas, or layers, of a network.
What will be an ideal response?
Tabs and commas can be used as ________ in paragraphs which allow text to be converted to multiple column tables
A) floating objects B) separator characters C) leaders D) handles
To launch VBA in Microsoft Excel, click the ________ tab and then click Visual Basic in the Code group
A) DESIGN B) VIEW C) INSERT D) DEVELOPER
Identify the letter of the choice that best matches the phrase or definition.
A. Accepts field values containing letters, numbers, spaces, and certain symbols. B. Accepts monetary values and displays them with a dollar sign and decimal point. C. Stores dates, times, or a combination of both. D. Stores Yes/No, True/False, or On/Off values. E. Stores long passages of text.