________ are malicious programs that come into a computer system disguised as something else such as a free computer game or screen saver.
A. Rogues
B. Zombies
C. Trojan horses
D. Scams
Answer: C
Computer Science & Information Technology
You might also like to view...
Write a method called doubleSize that accepts an integer array as a parameter and returns a reference to a new integer array that is twice as long and contains all of the elements of the first array in the same positions.
What will be an ideal response?
Computer Science & Information Technology
A ____ computer and its battery typically weigh between two and ten pounds.
A. notebook B. tablet C. personal D. desktop
Computer Science & Information Technology
Discuss in detail the creation of pages that degrade gracefully.
What will be an ideal response?
Computer Science & Information Technology
A data ____ might be a specifically identified role or part of the duties of a systems administrator.
A. owner B. custodian C. manager D. user
Computer Science & Information Technology