Which of the following is not a builtin function of legitimate software, but needs another piece of software to replicate/activate?

a. virus
b. worm
c. macro
d. trojan


Ans: a. virus

Computer Science & Information Technology

You might also like to view...

The general name for a program that converts programs written in a certain computer lan- guage into machine language is _________ .

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Client authentication is similar to user authentication but with the addition of ____.

A. integrated authorization B. file restrictions C. usage limits D. multifactor authentication

Computer Science & Information Technology

The maximum number of entry points that any programming structure can have is ____.

A. zero B. one C. three D. five

Computer Science & Information Technology

Answer the following statement(s) true (T) or false (F)

1. In a 16-bit signed integer, the right-most bit represents the sign of the binary value. 2. When programming instructions to add, subtract, multiply, divide, or compute, the expected size and format of the source tag or tags and answer tag must be taken into consideration. 3. Traditional PLCs allocate a portion of the controller’s physical memory segmented into data files for the storage of program-related information.

Computer Science & Information Technology