Which of the following is NOT an example of malicious code?
A. Trojan horses
B. worms
C. hackers
D. spyware
Answer: C
Computer Science & Information Technology
You might also like to view...
You can use the Hyperlink button to create links to ____________.
A. other slides in your presentation B. e-mail addresses C. slides in different presentations D. all of the above
Computer Science & Information Technology
switch is an example of a
A. pre processor directive B. comment C. keyword D. statement
Computer Science & Information Technology
When saving a new style, it is good practice to select a(n) ________ that reminds you of the type of text to which the style applies
Fill in the blank(s) with correct word
Computer Science & Information Technology
The DECnet protocols are based on a network architecture that is referred to as the ____.
A. Digital Network Architecture B. Digital Network Infrastructure C. Digital Network Alliance D. Digital Network Alignment
Computer Science & Information Technology