A co-worker downloads a game that ends up stealing information from the computer system. What is this?
A. Worm
B. Spam
C. Trojan
D. Spyware
Answer: C. Trojan
You might also like to view...
The Linux command to list a hierarchy of directories is
a: ls - -R directory -name b: ls - -a directory -name c: ls - -all directory -name d: ls - -hierarchy directory -name e: ls - - recursive directory –name
A star topology is most closely associated with
A) Novell networks B) Gateway networks C) Bus networks D) Ethernet networks
?During a presentation, you must control the discussion, maintain the pace of the presentation, and stay focused on the agenda - especially when answering questions.
Answer the following statement true (T) or false (F)
Which of the following is a number(s) or character(s) that is appended to or inserted into a primary key field?
A. check digit B. index C. insertion ordinal D. integer