____ is a general term used to describe software that violates a user's personal security.

A. Virus
B. Spyware
C. Worm
D. Logic bomb


Answer: B

Computer Science & Information Technology

You might also like to view...

DRM is an acronym for

a. Digital Role Maker. b. Digital Real Movie. c. Distribution Regional Media. d. Digital Rights Management.

Computer Science & Information Technology

To accomplish row striping, you should create a CSS ____________________ and apply it to every other row.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

When an Access object is selected, the right side of the ________ bar contains buttons for switching views

Fill in the blank(s) with correct word

Computer Science & Information Technology

En todos los programas de Office, los archivos se abren, guardan y cierran de la misma manera: en la vista Backstage.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology