Some Trojan horses contain a virus or a worm, which can replicate and spread. Virus experts call this a(n) _____ threat because it combines more than one type of malicious code.

A. blended
B. combined
C. mixed-up
D. included


Answer: A

Computer Science & Information Technology

You might also like to view...

A clock is reading 10:27:54.0 (hr:min:sec) when it is discovered to be 4 seconds fast. Explain why it is undesirable to set it back to the right time at that point and show (numerically) how it should be adjusted so as to be correct after 8 seconds has elapsed

What will be an ideal response?

Computer Science & Information Technology

A device used to convert high and low voltages into two different tones suitable for transmission over telephone lines is called a(n) ________

A) ISP B) frequency checker C) Internet D) modem

Computer Science & Information Technology

You can open the Info panel by clicking Window on the menu bar and then clicking Info, or by pressing the ____ key.

a. F4 b. F5 c. F6 d. F8

Computer Science & Information Technology

What mobile operating system below requires all applications to be reviewed and approved before they can be made available in the App store?

A. Android B. Blackberry OS C. iOS D. Symbian

Computer Science & Information Technology