A program with a benign capability that conceals another, sinister purpose is called a
a. hack.
b. rogue.
c. Trojan horse.
d. virus.
e. worm.
C
Computer Science & Information Technology
You might also like to view...
A binary search is a process of what order?
a) O(log2 n) b) O(n/2) c) O(n) d) O(2n)
Computer Science & Information Technology
Steganography can only utilize image files to hide data.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
What is a nonresident virus?
What will be an ideal response?
Computer Science & Information Technology
Default margins on an Excel 2013 worksheet are .75" top and bottom
Indicate whether the statement is true or false
Computer Science & Information Technology