__________ is malware that encrypts the user’s data and demands payment in order to access the key needed to recover the information.

A. Trojan horse B. Ransomware

C. Crimeware D. Polymorphic


B. Ransomware

Computer Science & Information Technology

You might also like to view...

More ____________________ capacity means your computer can load in lots of program instructions and data while other processing occurs.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

When you drag a center sizing handle to resize an object, both the height and width are adjusted simultaneously

Indicate whether the statement is true or false

Computer Science & Information Technology

What class has a static field named Empty that represents an event that contains no event data?

A. delegate B. EventArgs C. EventHandler D. MouseArgs

Computer Science & Information Technology

Which of the following printer types requires calibration to ensure the nozzle is adjusted to print properly?

A. Impact B. Inkjet C. Laser D. Thermal

Computer Science & Information Technology