A(n) ________ virus temporarily erases its code from the files where it resides, and then hides in the active memory of the computer.

Fill in the blank(s) with the appropriate word(s).


stealth

Computer Science & Information Technology

You might also like to view...

Use ls –l (Sobell, page 98) to display the permissions of the file you just cre- ated. Who owns the file? To which group does it belong? Which permissions does the owner of the file have? The group? Others?

What will be an ideal response?

Computer Science & Information Technology

Business owners expect at some future point, the business will become:

A) profitable. B) adverse. C) negative. D) useful.

Computer Science & Information Technology

A wired network has a Gigabit Ethernet switch, Gigabit Ethernet adapters, and CAT5 wiring. What is the maximum speed this network supports?

a. 1000Mbps Ethernet b. 10Mbps Ethernet c. 100Mbps Ethernet d. Half-duplex

Computer Science & Information Technology

After entering a GoogleLookup formula, Google Spreadsheets momentarily displays the word "____________________" until it evaluates the formula to determine the value to display in that cell.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology