Which of the following is a program that appears useful, but instead does harm to a user's computer?
A. virus
B. buffer attack
C. Trojan horse
D. worm
Answer: C
You might also like to view...
If you have a node pointer named head, which is pointing to a valid node, how do you access the member variable in the node named item?
a. head.item b. *head.item c. (*head).item d. head->item e. all of the above f. A or B g. C or D
Left, right, centered, and justified are examples of:
A) text alignments. B) formats. C) themes. D) styles.
The writing of an algorithm using computer-language statements is called ____ the algorithm.
A. compiling B. coding C. interpreting D. debugging
A ____ statement is an alternative to the if-else chain for situations when the condition involves comparing an integer expression to a specific value.
a. switch b. for c. while d. do-while