A ________ can propagate over a computer network and does not require an unsuspecting individual to open a file or execute a program or macro.

a. logic bomb
b. virus
c. worm
d. time bomb


Ans: c. worm

Computer Science & Information Technology

You might also like to view...

You will create a Road Sign Review Web application. The Road Sign Review Web application should consist of two JSP pages. This application displays road signs for the user to review and allows the user to schedule a driving test. The first page (named roadSigns) should display 15 road sign images that will be provided for you. The page should display the images by retrieving their information from the RoadSigns database. This page also will contain two input fields (which look like JTextFields) and a button that allow the user to enter information to register for a driving test. When the user clicks the Register button, the second page (roadTestRegis- tered) displays information confirming that the user has registered for a driving test. For this exercise, you need only organ

What will be an ideal response?

Computer Science & Information Technology

Each small element that is recorded by a photo detector is called a picture element or ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

It is not recommended to use the ________ formatting techniques found on the Home tab with PivotTables

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

You can overload an operator for a built-in data type. For example, you can change the meaning of + between two ints.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology