Any file that can self-replicate is a ________

a. Virus
b. Worm
c. Trojan horse
d. None of the above


Answer A.

Computer Science & Information Technology

You might also like to view...

Which of the following is an ethical activity?

a) hacking b) plagiarism c) software piracy d) algorithm refinement

Computer Science & Information Technology

The method setRolloverIcon is used to ________.

a. Handle a key event b. Change the button text c. Change the button icon d. All of the above

Computer Science & Information Technology

When you want to present a list of bulleted or numbered points, use one of PowerPoint's title and ____________________ layouts.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following should you NOT do to secure a wireless network?

a. Implement media access control. b. Keep the default network name and router password. c. Create a security encryption passphrase. d. Disable SSID broadcasting.

Computer Science & Information Technology