When a user opens an infected application file or document, a(n) ____ attaches itself to the application and infects other files accessed by the same application.

A. macro virus
B. worm
C. Trojan
D. logic bomb


Answer: A

Computer Science & Information Technology

You might also like to view...

The total number of elements that can be stored in a string without increasing its current amount of allocated memory is called its:

a. Size. b. Length. c. Capacity. d. Maximum size.

Computer Science & Information Technology

Which of the following can be an argument to a method?

a. Constants. b. Variables. c. Expressions. d. All of the above.

Computer Science & Information Technology

Many touchscreens have a(n) _______________ coating designed to repel the oils deposited by fingers that tap and swipe the screen.

A. gorilla B. granular C. semiconductive D. oleophobic

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. When adding a record to a sequential file, it is added to end of the file. 2. The master file holds all of the data to be updated. 3. The activity file holds all of the data to update the master file. 4. Backup files are not important to keep. 5. To update a sequential file, each record must be read sequentially and check to see if it needs updating.

Computer Science & Information Technology