This type of malware replicates through networks.

A. rootkit
B. macro
C. worm
D. Trojan


Answer: C

Computer Science & Information Technology

You might also like to view...

processor manipulates __________ stored in memory under the control of __________ stored in memory.

a. hardware settings/a program b. a program/data c. data/hardware settings d. data/a program

Computer Science & Information Technology

Describe two ways that DNS forwarding can be set up.

What will be an ideal response?

Computer Science & Information Technology

In a pixel grid, the y-coordinates increase positively towards the top.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

_____________ is the most popular biometrics technique.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology