When a user opens an infected application file or document, a(n) ____ attaches itself to the application and infects other files accessed by the same application.
A. macro virus
B. worm
C. Trojan
D. logic bomb
Answer: A
You might also like to view...
The total number of elements that can be stored in a string without increasing its current amount of allocated memory is called its:
a. Size. b. Length. c. Capacity. d. Maximum size.
Which of the following can be an argument to a method?
a. Constants. b. Variables. c. Expressions. d. All of the above.
Many touchscreens have a(n) _______________ coating designed to repel the oils deposited by fingers that tap and swipe the screen.
A. gorilla B. granular C. semiconductive D. oleophobic
Answer the following statements true (T) or false (F)
1. When adding a record to a sequential file, it is added to end of the file. 2. The master file holds all of the data to be updated. 3. The activity file holds all of the data to update the master file. 4. Backup files are not important to keep. 5. To update a sequential file, each record must be read sequentially and check to see if it needs updating.