____________________ refers to malicious programs that have many different capabilities. Some might do something relatively harmless, such as opening files on a CD-ROM; others might be extremely destructive, perhaps destroying all of the data on a computer.
Fill in the blank(s) with the appropriate word(s).
Malware
You might also like to view...
What would be displayed as a result of executing the following code?
int x = 578; System.out.print("There are " + x + 5 + "\n" + "hens in the hen house."); a. There are 583 hens in the hen house. b. There are 5785 hens in the hen house. c. There are x5\nhens in the hen house. d. There are 5785 hens in the hen house.
The _____ in the Arrange group on the Picture Tools Format tab is a shortcut to formatting a graphic as a floating graphic with the Square wrapping option and moving the graphic to a specific position on the page.?
A. ?Position button B. ?Page button C. ?Drop button D. Object button?
Hashes provide _______, but not _______.
A. Integrity, confidentiality B. Availability, integrity C. Confidentiality, availability D. Confidentiality, integrity E. Integrity, availability
The transformation and registration points can overlap-this is displayed as a plus sign within a circle ?.??
Answer the following statement true (T) or false (F)