A program that is covertly inserted into a system with the intent of compromising the integrity or confidentiality of the victim’s data is __________.

A. Adobe B. Animoto
C. malware D. Prezi


C. malware

Computer Science & Information Technology

You might also like to view...

Which of the following creates some white space between cell contents?

A. border: solid 1px black; B. space: 4px; C. padding: 4px; D. margin-left: 4px;

Computer Science & Information Technology

Captions can be used in place of transcripts.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

[CTRL][K] is the shortcut for opening the Insert Hyperlink dialog box.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following is the general syntax of the function prototype to overload the pre-increment operator ++ as a member function?

A. className operator++(); B. className operator++(int); C. friend className operator++(); D. friend className operator++(int);

Computer Science & Information Technology