Answer the following statements true (T) or false (F)

1. Malicious software aims to trick users into revealing sensitive personal information.
2. Keyware captures keystrokes on a compromised system.
3. Metamorphic code is software that can be shipped unchanged to a heterogeneous collection of platforms and execute with identical semantics.
4. A virus that attaches to an executable program can do anything that the program is permitted to do.
5. It is not possible to spread a virus via a USB stick.


1. TRUE
2. FALSE
3. FALSE
4. TRUE
5. FALSE

Computer Science & Information Technology

You might also like to view...

This device converts the electronic signal to an optical signal, and vice versa.

What will be an ideal response?

Computer Science & Information Technology

How does external fragmentation occur?

What will be an ideal response?

Computer Science & Information Technology

You must call most methods other than ________ explicitly to tell them to perform their tasks.

a. public methods b. main c. static methods d. private methods

Computer Science & Information Technology

________ are brief statements representing generalizations or advice.

A) Sayings B) Tales C) Customs D) Art forms

Computer Science & Information Technology