________ are malicious programs that come into a computer system disguised as something else such as a free computer game or screen saver.

A. Rogues
B. Zombies
C. Trojan horses
D. Scams


Answer: C

Computer Science & Information Technology

You might also like to view...

Write a method called doubleSize that accepts an integer array as a parameter and returns a reference to a new integer array that is twice as long and contains all of the elements of the first array in the same positions.

What will be an ideal response?

Computer Science & Information Technology

A ____ computer and its battery typically weigh between two and ten pounds.

A. notebook B. tablet C. personal D. desktop

Computer Science & Information Technology

Discuss in detail the creation of pages that degrade gracefully.

What will be an ideal response?

Computer Science & Information Technology

A data ____ might be a specifically identified role or part of the duties of a systems administrator.

A. owner B. custodian C. manager D. user

Computer Science & Information Technology