Which of the following is a program that appears useful, but instead does harm to a user's computer?

A. virus
B. buffer attack
C. Trojan horse
D. worm


Answer: C

Computer Science & Information Technology

You might also like to view...

If you have a node pointer named head, which is pointing to a valid node, how do you access the member variable in the node named item?

a. head.item b. *head.item c. (*head).item d. head->item e. all of the above f. A or B g. C or D

Computer Science & Information Technology

Left, right, centered, and justified are examples of:

A) text alignments. B) formats. C) themes. D) styles.

Computer Science & Information Technology

The writing of an algorithm using computer-language statements is called ____ the algorithm.

A. compiling B. coding C. interpreting D. debugging

Computer Science & Information Technology

A ____ statement is an alternative to the if-else chain for situations when the condition involves comparing an integer expression to a specific value.

a. switch b. for c. while d. do-while

Computer Science & Information Technology