A malicious computer program that replicates and propagates itself without having to attach to a host is called which of the following?
A. virus
B. Trojan
C. worm
D. shell
Answer: C
Computer Science & Information Technology
You might also like to view...
To add a new record to a table, use the ________ operation.
(a) ADD (b) ADD INTO (c) INSERT (d) INSERT INTO
Computer Science & Information Technology
Windows Recovery Environment is a parallel, minimum Windows installation that enables you to boot your computer when your Windows 8.1 installation will not start by any of the other advanced startup modes
Indicate whether the statement is true or false
Computer Science & Information Technology
Describe the Bell-LaPadula model.
What will be an ideal response?
Computer Science & Information Technology
Google Drive provides ____ GB of free online storage for the files that you create.
A. 5 B. 15 C. 25 D. 50
Computer Science & Information Technology