This type of malware replicates through networks.
A. rootkit
B. macro
C. worm
D. Trojan
Answer: C
Computer Science & Information Technology
You might also like to view...
processor manipulates __________ stored in memory under the control of __________ stored in memory.
a. hardware settings/a program b. a program/data c. data/hardware settings d. data/a program
Computer Science & Information Technology
Describe two ways that DNS forwarding can be set up.
What will be an ideal response?
Computer Science & Information Technology
In a pixel grid, the y-coordinates increase positively towards the top.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
_____________ is the most popular biometrics technique.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology