Which type of worm or virus covertly places illegal destructive instructions in the middle of a legitimate program so that once you run the program, it can go to work?
A) File virus
B) Logic virus
C) Macro virus
D) Multipartite virus
E) None of the above
Ans: E) None of the above
You might also like to view...
Access has a specialized ________ that can be used for mailing labels, name tags, or other types of labels
A) table B) report C) query D) form
To display Task View using the keyboard, press [Windows][Tab].
Answer the following statement true (T) or false (F)
After the following statements execute, what are the contents of matrix?int matrix[3][2];int j, k;for (j = 0; j < 3; j++) for (k = 0; k < 2; k++) matrix[j][k] = j + k;
A. 0 0 1 1 2 2 B. 0 1 2 3 4 5 C. 0 1 1 2 2 3 D. 1 1 2 2 3 3
Which of the following commands would be used to identify how many hops a data packet makes before reaching its final destination?
A. route B. netstat C. traceroute D. ping 127.0.0.1