A ________ is a program that replicates itself and infects computers.
a. rootkit
b. denial-of-service attack
c. time bomb
d. virus
d. virus
Computer Science & Information Technology
You might also like to view...
Define the top-down approach as it relates to drawing data flow diagrams.
What will be an ideal response?
Computer Science & Information Technology
Eugene received an Access table from a field representative that he wants to import into Excel and format with a Medium 2 format as the table style. How would he import and format the Access data?
What will be an ideal response?
Computer Science & Information Technology
You create and manage multiple desktops in Virtual View.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
If you regularly use a program which uses useful pop-ups, you can ________ them for that site in Internet properties Pop-up blocker settings
Fill in the blank(s) with correct word
Computer Science & Information Technology