A(n) ________ takes advantage of file transport methods, such as e-mail, to spread on its own.

A. worm
B. script virus
C. encryption virus
D. macro virus


Answer: A

Computer Science & Information Technology

You might also like to view...

The function's header and footer contain the ____ keyword.

A. Sub B. FunctionProcedure C. SubFunction D. Function

Computer Science & Information Technology

In order to add a menu to a form, you must place a __________ on the form.

a. MenuCommand control b. MenuItem control c. MenuOption control d. MenuStrip control

Computer Science & Information Technology

The task of subdividing memory to accommodate multiple processes is carried out dynamically by the operating system and is known as ___________ .

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Worms can spread without human intervention

Indicate whether the statement is true or false.

Computer Science & Information Technology