A(n) ________ takes advantage of file transport methods, such as e-mail, to spread on its own.
A. worm
B. script virus
C. encryption virus
D. macro virus
Answer: A
Computer Science & Information Technology
You might also like to view...
The function's header and footer contain the ____ keyword.
A. Sub B. FunctionProcedure C. SubFunction D. Function
Computer Science & Information Technology
In order to add a menu to a form, you must place a __________ on the form.
a. MenuCommand control b. MenuItem control c. MenuOption control d. MenuStrip control
Computer Science & Information Technology
The task of subdividing memory to accommodate multiple processes is carried out dynamically by the operating system and is known as ___________ .
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Worms can spread without human intervention
Indicate whether the statement is true or false.
Computer Science & Information Technology