Which of the following statements best describes a Trojan?
A) Malicious software that hides into the lower levels of the operating system and opens a backdoor
B) Malicious software that records every key stroke and mouse movement
C) Malicious software that disguises itself as a legitimate program
D) Malicious software that takes the computer data hostage to extort money
C) Malicious software that disguises itself as a legitimate program
You might also like to view...
You can add tags to a bitmap image
Indicate whether the statement is true or false
Which view is a condensed view of a document that is used in conjunction with styles?
A) Full Screen Reading B) Print Layout C) Outline D) Draft
calcA solves H = kA(T2 - T1) / X for A double calcA (double H, double k, double T2, double T1, double X)
What will be an ideal response?
As you write a VBA statement, IntelliSense technology helps you complete it.
Answer the following statement true (T) or false (F)