Collectively, all malicious programs are referred to as:

A. vectors
B. bugs
C. malware
D. suites


Answer: C

Computer Science & Information Technology

You might also like to view...

A gradient smoothness setting of ____ indicates an equally weighted transition in color pixels.

a. 0% b. 25% c. 50% d. 100%

Computer Science & Information Technology

In a function call, the items enclosed in parentheses are known as ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Reusable pieces of formatted content or document parts, such as custom headers, are called what?

A. Building blocks B. Fields C. Content controls D. Custom parts

Computer Science & Information Technology

The process of applying a salt and cryptographic hash to a password then repeating the process many times is known as which of the following?

A. Collision resistance B. Rainbow table C. Key stretching D. Brute force attack

Computer Science & Information Technology