________ is a malicious software program capable of reproducing itself across multiple computers and causing damage to an infected computer

A) Spyware B) Shareware C) Spam D) A computer virus


D

Computer Science & Information Technology

You might also like to view...

When a subclass is created, the __________ and __________ of the parent class automatically become members of the child class.

Fill in the blank(s) with correct word

Computer Science & Information Technology

If a subscript is valid, it is said to be in ____.

A. order B. value C. index D. range

Computer Science & Information Technology

____________________ is a debugging technique that allows packets to explicitly state the route they will follow to their destination rather than follow normal routing rules.?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

If a numeric list in Word is sorted in descending order, the numbers will display from lowest to highest

Indicate whether the statement is true or false

Computer Science & Information Technology