Critical Thinking QuestionsCase 1-2John's new computer has started to perform oddly and he is concerned that it may have become infected with malware. He knows that you work for a company that produces antivirus software so he gives you a call to ask for advice.What do you tell him is the difference between a worm and a Trojan horse?

What will be an ideal response?


A worm is a program that copies itself repeatedly, for example in memory or on a network, using up resources and possibly shutting down the computer or network. A Trojan horse (named after the Greek myth) is a program that hides within or looks like a legitimate program. A certain condition or action usually triggers the Trojan horse. Unlike a virus or worm, a Trojan horse does not replicate itself to other computers.

Computer Science & Information Technology

You might also like to view...

You cannot bind an object in a dataset to an existing control on the form.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A ________ can be the aggregate of 2018 Profit or a monthly sales goal that every employee should meet

A) target value B) status threshold C) KPI D) base value

Computer Science & Information Technology

Referential integrity means that for each value in the ________ field of a table, there is a corresponding value in the primary key of the related table.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

____ computing enables researchers to easily and transparently access computer facilities without regard for their location.

a. Database b. Library c. Grid d. Universal

Computer Science & Information Technology