Any file that can self-replicate is a ________
a. Virus
b. Worm
c. Trojan horse
d. None of the above
Answer A.
Computer Science & Information Technology
You might also like to view...
Which of the following is an ethical activity?
a) hacking b) plagiarism c) software piracy d) algorithm refinement
Computer Science & Information Technology
The method setRolloverIcon is used to ________.
a. Handle a key event b. Change the button text c. Change the button icon d. All of the above
Computer Science & Information Technology
When you want to present a list of bulleted or numbered points, use one of PowerPoint's title and ____________________ layouts.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Which of the following should you NOT do to secure a wireless network?
a. Implement media access control. b. Keep the default network name and router password. c. Create a security encryption passphrase. d. Disable SSID broadcasting.
Computer Science & Information Technology