A co-worker downloads a game that ends up stealing information from the computer system. What is this?

A. Worm
B. Spam
C. Trojan
D. Spyware


Answer: C. Trojan

Computer Science & Information Technology

You might also like to view...

The Linux command to list a hierarchy of directories is

a: ls - -R directory -name b: ls - -a directory -name c: ls - -all directory -name d: ls - -hierarchy directory -name e: ls - - recursive directory –name

Computer Science & Information Technology

A star topology is most closely associated with

A) Novell networks B) Gateway networks C) Bus networks D) Ethernet networks

Computer Science & Information Technology

?During a presentation, you must control the discussion, maintain the pace of the presentation, and stay focused on the agenda - especially when answering questions.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following is a number(s) or character(s) that is appended to or inserted into a primary key field?

A. check digit B. index C. insertion ordinal D. integer

Computer Science & Information Technology