Which of the following is not a builtin function of legitimate software, but needs another piece of software to replicate/activate?
a. virus
b. worm
c. macro
d. trojan
Ans: a. virus
You might also like to view...
The general name for a program that converts programs written in a certain computer lan- guage into machine language is _________ .
Fill in the blank(s) with the appropriate word(s).
Client authentication is similar to user authentication but with the addition of ____.
A. integrated authorization B. file restrictions C. usage limits D. multifactor authentication
The maximum number of entry points that any programming structure can have is ____.
A. zero B. one C. three D. five
Answer the following statement(s) true (T) or false (F)
1. In a 16-bit signed integer, the right-most bit represents the sign of the binary value. 2. When programming instructions to add, subtract, multiply, divide, or compute, the expected size and format of the source tag or tags and answer tag must be taken into consideration. 3. Traditional PLCs allocate a portion of the controller’s physical memory segmented into data files for the storage of program-related information.