Malware that locks or prevents a device from functioning properly until a fee has been paid is known as:

A. lock-ware
B. ransomware
C. stealware
D. hostageware


Answer: B

Computer Science & Information Technology

You might also like to view...

Types in Java are divided into two categories. The primitive types are boolean, byte, char, short, int, long, float and double. All other types are ________ types.

a. static b. reference c. declared d. source

Computer Science & Information Technology

You should use the ________ character in places of spaces in a filename

A) period (.) B) pound (#) C) percent (%) D) underscore (_)

Computer Science & Information Technology

Which of the following modes of replication requires a very low latency network connection and ensures data remains in synch with zero data loss in the event of a failure at the source site?

A. Virtual replication B. Asynchronous replication C. Synchronous replication D. Paired replication

Computer Science & Information Technology

Bit stream methods commonly use algorithm functions like the exclusive OR operation (__________).

A. XOR B. EOR C. NOR D. OR

Computer Science & Information Technology