A program with a benign capability that conceals another, sinister purpose is called a

a. hack.
b. rogue.
c. Trojan horse.
d. virus.
e. worm.


C

Computer Science & Information Technology

You might also like to view...

A binary search is a process of what order?

a) O(log2 n) b) O(n/2) c) O(n) d) O(2n)

Computer Science & Information Technology

Steganography can only utilize image files to hide data.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What is a nonresident virus?

What will be an ideal response?

Computer Science & Information Technology

Default margins on an Excel 2013 worksheet are .75" top and bottom

Indicate whether the statement is true or false

Computer Science & Information Technology