__________ are malware programs that hide their true nature and reveal their designed behavior only when activated.

A. Viruses
B. Worms
C. Spam
D. Trojan horses


Answer: D

Computer Science & Information Technology

You might also like to view...

What is the chief purpose of NAT?

What will be an ideal response?

Computer Science & Information Technology

The ________ works within the network to determine where data from another network should go

A) packet B) wireless router C) router D) switch

Computer Science & Information Technology

Press the right arrow key to move the insertion point to the next cell in a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

You have a PivotTable with 2 fields in the ROWS area and you want to see only the top level of categories. How do you hide the entire second level without removing it from the ROWS area?

A) Select a field in the row headers and click Collapse Field in the Active Field Group on the Analyze tab. B) You must move the second level out of the ROWS area. C) Click Expand Field in the Active Field Group on the Analyze tab. D) Click the - button to the left of the first category.

Computer Science & Information Technology