A ________ is a program that replicates itself and infects computers.

a. rootkit
b. denial-of-service attack
c. time bomb
d. virus


d. virus

Computer Science & Information Technology

You might also like to view...

Define the top-down approach as it relates to drawing data flow diagrams.

What will be an ideal response?

Computer Science & Information Technology

Eugene received an Access table from a field representative that he wants to import into Excel and format with a Medium 2 format as the table style. How would he import and format the Access data?

What will be an ideal response?

Computer Science & Information Technology

You create and manage multiple desktops in Virtual View.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

If you regularly use a program which uses useful pop-ups, you can ________ them for that site in Internet properties Pop-up blocker settings

Fill in the blank(s) with correct word

Computer Science & Information Technology