A malicious computer program that replicates and propagates itself without having to attach to a host is called which of the following?

A. virus
B. Trojan
C. worm
D. shell


Answer: C

Computer Science & Information Technology

You might also like to view...

To add a new record to a table, use the ________ operation.

(a) ADD (b) ADD INTO (c) INSERT (d) INSERT INTO

Computer Science & Information Technology

Windows Recovery Environment is a parallel, minimum Windows installation that enables you to boot your computer when your Windows 8.1 installation will not start by any of the other advanced startup modes

Indicate whether the statement is true or false

Computer Science & Information Technology

Describe the Bell-LaPadula model.

What will be an ideal response?

Computer Science & Information Technology

Google Drive provides ____ GB of free online storage for the files that you create.

A. 5 B. 15 C. 25 D. 50

Computer Science & Information Technology