Some Trojan horses contain a virus or a worm, which can replicate and spread. Virus experts call this a(n) _____ threat because it combines more than one type of malicious code.
A. blended
B. combined
C. mixed-up
D. included
Answer: A
You might also like to view...
A clock is reading 10:27:54.0 (hr:min:sec) when it is discovered to be 4 seconds fast. Explain why it is undesirable to set it back to the right time at that point and show (numerically) how it should be adjusted so as to be correct after 8 seconds has elapsed
What will be an ideal response?
A device used to convert high and low voltages into two different tones suitable for transmission over telephone lines is called a(n) ________
A) ISP B) frequency checker C) Internet D) modem
You can open the Info panel by clicking Window on the menu bar and then clicking Info, or by pressing the ____ key.
a. F4 b. F5 c. F6 d. F8
What mobile operating system below requires all applications to be reviewed and approved before they can be made available in the App store?
A. Android B. Blackberry OS C. iOS D. Symbian