Which type of worm or virus covertly places illegal destructive instructions in the middle of a legitimate program so that once you run the program, it can go to work?

A) File virus
B) Logic virus
C) Macro virus
D) Multipartite virus
E) None of the above


Ans: E) None of the above

Computer Science & Information Technology

You might also like to view...

Access has a specialized ________ that can be used for mailing labels, name tags, or other types of labels

A) table B) report C) query D) form

Computer Science & Information Technology

To display Task View using the keyboard, press [Windows][Tab].

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

After the following statements execute, what are the contents of matrix?int matrix[3][2];int j, k;for (j = 0; j < 3; j++)   for (k = 0; k < 2; k++)     matrix[j][k] = j + k; 

A. 0 0 1 1 2 2 B. 0 1 2 3  4 5 C. 0 1 1 2  2 3 D. 1 1 2 2  3 3

Computer Science & Information Technology

Which of the following commands would be used to identify how many hops a data packet makes before reaching its final destination?

A. route B. netstat C. traceroute D. ping 127.0.0.1

Computer Science & Information Technology