Which of the following is NOT an example of malicious code?

A. Trojan horses
B. worms
C. hackers
D. spyware


Answer: C

Computer Science & Information Technology

You might also like to view...

You can use the Hyperlink button to create links to ____________.

A. other slides in your presentation B. e-mail addresses C. slides in different presentations D. all of the above

Computer Science & Information Technology

switch is an example of a

A. pre processor directive B. comment C. keyword D. statement

Computer Science & Information Technology

When saving a new style, it is good practice to select a(n) ________ that reminds you of the type of text to which the style applies

Fill in the blank(s) with correct word

Computer Science & Information Technology

The DECnet protocols are based on a network architecture that is referred to as the ____.

A. Digital Network Architecture B. Digital Network Infrastructure C. Digital Network Alliance D. Digital Network Alignment

Computer Science & Information Technology