Which of the following is NOT an example of malware?

A. trojan horses
B. zombies
C. vaporware
D. worms


Answer: C

Computer Science & Information Technology

You might also like to view...

Which of the following performs an unboxing conversion? Assume x refers to an Integer object.

a. int y = x; b. Integer y = x; c. Neither of the above. d. Both of the above.

Computer Science & Information Technology

Consider the following relations for a database that keeps track of student enrollment in courses and the books adopted for each course:

STUDENT (SSN, Name, Major, Bdate) COURSE (Course#, Quarter, Grade) ENROLL (SSN, Course#, Quarter, Grade) BOOK_ADOPTION (Course#, Quarter, Book_ISBN) TEXT (Book_ISBN, Book_Title, Publisher, Author) Specify the foreign keys for this schema, stating any assumptions you make.

Computer Science & Information Technology

What serves the site to anyone who visits the domain in a browser?

a. Domain name b. Web host c. Name server d. FTP client

Computer Science & Information Technology

Java performs automatic __________ of objects that are no longer referenced in a program.

a. memory distribution. b. garbage collection. c. storage compression. d. trash aggregation.

Computer Science & Information Technology